Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 1 only 2 only 3 and 4 1 and 2 1 only 2 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum number of IP addresses that can be assigned to hosts on a local subnet that uses the 255.255.255.224 subnet mask? 16 14 30 15 16 14 30 15 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following digits are known as the terminal number of the Network User Address (NUA)? 08-Dec None of these 13-14 05-Jul 01-Apr 08-Dec None of these 13-14 05-Jul 01-Apr ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In session layer, during data transfer, the data stream responsible for the "control" purpose (i.e control of the session layer itself) is Typed data Expedited Data Regular Data Capability Data Typed data Expedited Data Regular Data Capability Data ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to totally reinitialize the router and replace the current running-config with the current startup-config. What command will you use? reload replace run start copy run start copy start run reload replace run start copy run start copy start run ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to configure a router for a Frame Relay connection to a non-Cisco router. Which of the following commands will prepare the WAN interface of the router for this connection? Router(config-if)# encapsulation frame-relay q933a Router(config-if)# encapsulation frame-relay ietf Router(config-if)# encapsulation frame-relay cisco Router(config-if)# encapsulation frame-relay ansi Router(config-if)# encapsulation frame-relay q933a Router(config-if)# encapsulation frame-relay ietf Router(config-if)# encapsulation frame-relay cisco Router(config-if)# encapsulation frame-relay ansi ANSWER DOWNLOAD EXAMIANS APP