Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 1 only 2 only 3 and 4 1 and 2 1 only 2 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? 255.255.255.224 255.255.255.248 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.192 255.255.255.240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A characteristic of a multiprogramming system is: multiple CPUs simultaneous execution of program instructions from two applications concurrent processing of two or more programs None of these All listed here multiple CPUs simultaneous execution of program instructions from two applications concurrent processing of two or more programs None of these All listed here ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The most important part of a multiple DHCP configurations is to make sure you don't have which of the following in the different scopes? Select the best answer. Duplicate addresses Duplicate subnets Duplicate pools None of these Duplicate default gateways Duplicate addresses Duplicate subnets Duplicate pools None of these Duplicate default gateways ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum data rate for the 802.11g standard? 6Mbps 54Mbps 11Mbps 22Mbps 6Mbps 54Mbps 11Mbps 22Mbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following device is used to connect two systems, especially if the systems use different protocols? hub None of these bridge gateway repeater hub None of these bridge gateway repeater ANSWER DOWNLOAD EXAMIANS APP