Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 2 only 1 only 1 and 2 3 and 4 2 only 1 only 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a synchronous modem, the receive equalizer is known as impairment equalizer compromise equalizer statistical equalizer None of these adaptive equalizer impairment equalizer compromise equalizer statistical equalizer None of these adaptive equalizer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which application allows a user to access and change remote files without actual transfer? DNS None of these TELNET NFS FTP DNS None of these TELNET NFS FTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The systematic access of small computers in a distributed data processing system is referred to as: polling multiplexing None of these dialed service conversational mode polling multiplexing None of these dialed service conversational mode ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Identify the odd term amongst the following group: Coaxial cable Twisted pair wire None of these Microwaves Optical fibre Coaxial cable Twisted pair wire None of these Microwaves Optical fibre ANSWER DOWNLOAD EXAMIANS APP