Computer Networking Which of the following program is used to copy files to or from another UNIX timesharing system over a single link? TFTP UUCP None of these UART VMTP TFTP UUCP None of these UART VMTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following modes are valid when a switch port is used as a VLAN trunk?1. Blocking2. Dynamic auto3. Dynamic desirable4. Nonegotiate5. Access6. Learning 4, 5 and 6 1, 2 and 6 2, 4, and 5 2, 3 and 4 4, 5 and 6 1, 2 and 6 2, 4, and 5 2, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following medium access control technique is used for bus/tree? CSMA token bus token ring MAC None of these CSMA token bus token ring MAC None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The topology with highest reliability is: Mesh topology Bus topology Star topology Ring topology Mesh topology Bus topology Star topology Ring topology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an important characteristic of LAN? low cost access for low bandwidth channels unlimited expansion parallel transmission None of these application independent interfaces low cost access for low bandwidth channels unlimited expansion parallel transmission None of these application independent interfaces ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is considered to be the destination host after translation? Inside global Outside global Inside local Outside local Inside global Outside global Inside local Outside local ANSWER DOWNLOAD EXAMIANS APP