Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 3 only 1 only 1, 3 and 4 3 and 4 3 only 1 only 1, 3 and 4 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network consists of eight NT servers. You are planning to move servers to different segments of your network, what utility should be used at each server to determine which server generates the most traffic? Performance Monitor NETSTAT.EXE NBTSTAT ARP.EXE Network Monitor Performance Monitor NETSTAT.EXE NBTSTAT ARP.EXE Network Monitor ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are unsuccessful in telnetting into a remote device. What could the problem be?1. IP addresses are incorrect.2. Access control list is filtering Telnet.3. There is a defective serial cable.4. The VTY password is missing. All of these 1 only 2 and 4 only 3 only All of these 1 only 2 and 4 only 3 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following allows a simple email service and is responsible for moving messages from one mail server to another? IMAP SMTP POP3 DHCP FTP IMAP SMTP POP3 DHCP FTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Because the configuration infor-mation for a DHCP client is received dynamically, you must use which utility to read the current configuration to verify the settings? TRACERT None of these IPCONFIG ARP PING TRACERT None of these IPCONFIG ARP PING ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a class C network. You are required to configure it for five subnets, each of which will support 25 nodes. What subnet should you use? 255.255.255.0 255.255.255.252 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.0 255.255.255.252 255.255.255.240 255.255.255.224 255.255.255.248 ANSWER DOWNLOAD EXAMIANS APP