Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 7 protocols Layer 6 protocols Layer 4 protocols None of these Layer 5 protocols Layer 7 protocols Layer 6 protocols Layer 4 protocols None of these Layer 5 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The packets switching concept was first proposed in the late 1950s for Defense Ministry of US All of these in the late 1980s for the Defense Ministry of US. in the early 1960s for military communication systems, mainly to handle speech None of these in the late 1950s for Defense Ministry of US All of these in the late 1980s for the Defense Ministry of US. in the early 1960s for military communication systems, mainly to handle speech None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The modern enterprise is interconnected internally and externally by the Internet, intranets, and other networks. Select the best fit for answer: Internetworked enterprise None of these Client/Server networks Business applications of telecommunications Information super highway Internetworked enterprise None of these Client/Server networks Business applications of telecommunications Information super highway ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which EIGRP information is held in RAM and maintained through the use of Hello and update packets?1. Neighbor table2. STP table3. Topology table4. DUAL table 1 and 3 All of these 4 only 2 only 1 and 3 All of these 4 only 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Telecommunication networks frequently interconnect an organization with its customers and suppliers. Select the best fit for answer: Inter organizational networks Bandwidth alternatives Switching alternating None of these Extranets Inter organizational networks Bandwidth alternatives Switching alternating None of these Extranets ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following modes are valid when a switch port is used as a VLAN trunk?1. Blocking2. Dynamic auto3. Dynamic desirable4. Nonegotiate5. Access6. Learning 1, 2 and 6 2, 4, and 5 4, 5 and 6 2, 3 and 4 1, 2 and 6 2, 4, and 5 4, 5 and 6 2, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP