Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 1 only 2 only 3 and 4 1 and 2 1 only 2 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statements are true regarding ICMP packets?1. They acknowledge receipt of a TCP segment.2. They guarantee datagram delivery.3. They can provide hosts with information about network problems.4. They are encapsulated within IP datagrams. 2 and 3 1 only 3 and 4 2, 3 and 4 2 and 3 1 only 3 and 4 2, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address of 201.142.23.12, what is your default subnet mask? 255.255.255.0 255.0.0.0 255.255.0.0 None of these 0.0.0.0 255.255.255.0 255.0.0.0 255.255.0.0 None of these 0.0.0.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many broadcast domains are created when you segment a network with a 12-port switch? 2 1 5 12 2 1 5 12 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are A and B both to assign address to private network DTEs None of these universal accessibility for private network Data Terminal Equipment (DTE) adequate cost control mechanisms for administration of the private networks A and B both to assign address to private network DTEs None of these universal accessibility for private network Data Terminal Equipment (DTE) adequate cost control mechanisms for administration of the private networks ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the minimum number of wires needed to send data over a serial communication link layer? 6 None of these 2 1 4 6 None of these 2 1 4 ANSWER DOWNLOAD EXAMIANS APP