Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 1 only 2 only 3 and 4 1 and 2 1 only 2 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 4 protocols Layer 7 protocols Layer 5 protocols Layer 6 protocols None of these Layer 4 protocols Layer 7 protocols Layer 5 protocols Layer 6 protocols None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands will allow you to set your Telnet password on a Cisco router? line telnet 0 4 line con 0 line vty 0 4 line aux 0 4 line telnet 0 4 line con 0 line vty 0 4 line aux 0 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement(s) about IPv6 addresses are true?1. Leading zeros are required.2. Two colons (::) are used to represent successive hexadecimal fields of zeros.3. Two colons (::) are used to separate fields.4. A single interface will have multiple IPv6 addresses of different types. All of these 1 and 3 1, 3 and 4 2 and 4 All of these 1 and 3 1, 3 and 4 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In which circumstance are multiple copies of the same unicast frame likely to be transmitted in a switched LAN? When upper-layer protocols require high reliability In an improperly implemented redundant topology After broken links are reestablished During high-traffic periods When upper-layer protocols require high reliability In an improperly implemented redundant topology After broken links are reestablished During high-traffic periods ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is considered to be the address before translation? Outside local Outside global Inside global Inside local Outside local Outside global Inside global Inside local ANSWER DOWNLOAD EXAMIANS APP