Computer Networking Which of the following commands sets a trunk port on a 2960 switch? trunk on switchport trunk on switchport mode trunk trunk all trunk on switchport trunk on switchport mode trunk trunk all ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many collision domains are created when you segment a network with a 12-port switch? 2 1 12 5 2 1 12 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring, because it uses a MAU Ethernet, because it is cabled using fiber-optic cable Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Token-Ring, because it uses a MAU Ethernet, because it is cabled using fiber-optic cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the frequency range of the IEEE 802.11b standard? 2.4GHz 5GHz 5Gbps 2.4Gbps 2.4GHz 5GHz 5Gbps 2.4Gbps ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: Network operating system Virtual Private Network Network Server OSI Network operating system Virtual Private Network Network Server OSI ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 3 2 4 5 3 2 4 5 ANSWER DOWNLOAD EXAMIANS APP