Computer Networking Which file transfer protocol uses UDP? NFS TFTP None of these FTP TELNET NFS TFTP None of these FTP TELNET ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which command will display the CHAP authentication process as it occurs between two routers in the network? show interface serial 0 debug ppp authentication debug chap authentication show chap authentication show interface serial 0 debug ppp authentication debug chap authentication show chap authentication ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 1 only 3 and 4 1, 3 and 4 3 only 1 only 3 and 4 1, 3 and 4 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network administrator wants to upgrade the IOS of a router without removing the image currently installed. What command will display the amount of memory consumed by the current IOS image and indicate whether there is enough room available to hold both the current and new images? show memory show flash show version show buffers show memory show flash show version show buffers ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main purpose of a data link content monitor? to detect problems in protocols to determine the flow of data to determine the type of transmission used in a data link None of these to determine the type of switching used in a data link. to detect problems in protocols to determine the flow of data to determine the type of transmission used in a data link None of these to determine the type of switching used in a data link. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Eight stations are competing for the use of a shared channel using the 'Adaptive tree Walk Protocol'. If the stations 7 and 8 are suddenly become ready at once, how many bit slots are needed to resolve the contention? 5 slots 14 slots 7 slots 10 slots None of these 5 slots 14 slots 7 slots 10 slots None of these ANSWER DOWNLOAD EXAMIANS APP