Computer Networking Which of the following modes are valid when a switch port is used as a VLAN trunk?1. Blocking2. Dynamic auto3. Dynamic desirable4. Nonegotiate5. Access6. Learning 2, 4, and 5 4, 5 and 6 1, 2 and 6 2, 3 and 4 2, 4, and 5 4, 5 and 6 1, 2 and 6 2, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking ICMP (Internet Control Message Protocol) is a TCP/IP high level protocol for transferring files from one machine to another a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address a protocol used to monitor computers a protocol that handles error and control messages None of these a TCP/IP high level protocol for transferring files from one machine to another a TCP/IP protocol used to dynamically bind a high level IP Address to a low-level physical hardware address a protocol used to monitor computers a protocol that handles error and control messages None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You telnet to a router and make your necessary changes; now you want to end the Telnet session. What command do you type in? disable disconnect close exit disable disconnect close exit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a _____ topology, if there are n devices in a network, each device has n - 1 ports for cables. bus ring mesh star None of these bus ring mesh star None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following would be good reasons to run NAT?1. You need to connect to the Internet and your hosts don't have globally unique IP addresses.2. You change to a new ISP that requires you to renumber your network.3. You don't want any hosts connecting to the Internet.4. You require two intranets with duplicate addresses to merge. All of these 1, 2 and 4 2 and 4 3 only All of these 1, 2 and 4 2 and 4 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the distinct functions of layer 2 switching that increase available bandwidth on the network?1. Address learning2. Routing3. Forwarding and filtering4. Creating network loops5. Loop avoidance6. IP addressing 2 and 6 1, 3 and 5 2, 4 and 6 3 and 5 2 and 6 1, 3 and 5 2, 4 and 6 3 and 5 ANSWER DOWNLOAD EXAMIANS APP