Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 1 only 1 and 2 2 only 3 and 4 1 only 1 and 2 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When data is encapsulated, which is the correct order? Segment, data, packet, frame, bit Data, frame, packet, segment, bit Data, segment, frame, packet, bit Data, segment, packet, frame, bit Segment, data, packet, frame, bit Data, frame, packet, segment, bit Data, segment, frame, packet, bit Data, segment, packet, frame, bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which class of IP address has the most host addresses available by default? A B C A and B A B C A and B ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following program is used to copy files to or from another UNIX timesharing system over a single link? UART None of these TFTP VMTP UUCP UART None of these TFTP VMTP UUCP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A central computer surrounded by one or more satellite computers is called a ring network star network All of these bus network None of these ring network star network All of these bus network None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command will permit SMTP mail to only host 1.1.1.1? access-list 110 permit ip smtp host 1.1.1.1 access-list 110 permit tcp any host 1.1.1.1 eq smtp access-list 10 permit smtp host 1.1.1.1 access-list 10 permit tcp any host 1.1.1.1 eq smtp access-list 110 permit ip smtp host 1.1.1.1 access-list 110 permit tcp any host 1.1.1.1 eq smtp access-list 10 permit smtp host 1.1.1.1 access-list 10 permit tcp any host 1.1.1.1 eq smtp ANSWER DOWNLOAD EXAMIANS APP