Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 only 1 and 2 3 and 4 2 only 1 only 1 and 2 3 and 4 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Terminals are used to None of these communicate management decisions to the physical system collect data from the physical system provide information for the manager All of these None of these communicate management decisions to the physical system collect data from the physical system provide information for the manager All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking 00 represents a pixel that pixel is known as : Light gray Dark gray pixel Black pixel White pixel Light gray Dark gray pixel Black pixel White pixel ANSWER DOWNLOAD EXAMIANS APP
Computer Networking End-to-end connectivity is provided from host-to-host in: Network layer Data link layer None of these Session layer Transport layer Network layer Data link layer None of these Session layer Transport layer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide? A physical address that is assigned by the manufacturer A logical address that identifies the workstation A physical address that is randomly assigned each time the computer is started The logical domain address for the workstation An alias for the computer name A physical address that is assigned by the manufacturer A logical address that identifies the workstation A physical address that is randomly assigned each time the computer is started The logical domain address for the workstation An alias for the computer name ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the port number for NNTP? 79 119 None of these 80 70 79 119 None of these 80 70 ANSWER DOWNLOAD EXAMIANS APP