Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 1 only 2 only 1 and 2 3 and 4 1 only 2 only 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Operating system functions may include multiprogramming virtual storage input/output control None of these All of these multiprogramming virtual storage input/output control None of these All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many pairs of stations can simultaneously communicate on Ethernet LAN? 1 3 None of these 2 multiple 1 3 None of these 2 multiple ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Communication between computers is almost always serial parallel None of these series parallel direct serial parallel None of these series parallel direct ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign? 255.255.240.0 255.255.252.0 255,255.248.0 255.255.192.0 255.255.224.0 255.255.240.0 255.255.252.0 255,255.248.0 255.255.192.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If an Ethernet port on a router were assigned an IP address of 172.16.112.1/25, what would be the valid subnet address of this host? 172.16.255.0 172.16.0.0 172.16.96.0 172.16.112.0 172.16.255.0 172.16.0.0 172.16.96.0 172.16.112.0 ANSWER DOWNLOAD EXAMIANS APP