Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 2 only 3 and 4 1 and 2 1 only 2 only 3 and 4 1 and 2 1 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true when describing a multicast address? These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets are delivered to all interfaces identified by the address. This is also called a one-to-many address. Identifies multiple interfaces and is only delivered to one address. This address can also be called one-to-one-of-many. Packets addressed to a unicast address are delivered to a single interface. These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. Packets are delivered to all interfaces identified by the address. This is also called a one-to-many address. Identifies multiple interfaces and is only delivered to one address. This address can also be called one-to-one-of-many. Packets addressed to a unicast address are delivered to a single interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network administrator is connecting hosts A and B directly through their Ethernet interfaces, as shown in the illustration. Ping attempts between the hosts are unsuccessful. What can be done to provide connectivity between the hosts?1. A crossover cable should be used in place of the straight-through cable.2. A rollover cable should be used in place of the straight-through cable.3. The subnet masks should be set to 255.255.255.192.4. A default gateway needs to be set on each host.5. The subnet masks should be set to 255.255.255.0. 3 and 4 only 2 only 1 only 2 and 5 only 1 and 5 only 3 and 4 only 2 only 1 only 2 and 5 only 1 and 5 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a network with dozens of switches, how many root bridges would you have? 1 2 5 12 1 2 5 12 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are unique characteristics of half-duplex Ethernet when compared to full-duplex Ethernet?1. Half-duplex Ethernet operates in a shared collision domain.2. Half-duplex Ethernet operates in a private collision domain.3. Half-duplex Ethernet has higher effective throughput.4. Half-duplex Ethernet has lower effective throughput. 1,2 and 3 2 only 1 and 4 4 only 1,2 and 3 2 only 1 and 4 4 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum distance with maximum data rate for 802.11b? About 90-100 feet About 65-75 feet Over 200 feet About 150 feet About 90-100 feet About 65-75 feet Over 200 feet About 150 feet ANSWER DOWNLOAD EXAMIANS APP