Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 2 3 5 4 2 3 5 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is not a standard synchronous communication protocol? SMTP SDLC PAS None of these SLIP SMTP SDLC PAS None of these SLIP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Identify the odd term amongst the following group: None of these Microwaves Twisted pair wire Optical fibre Coaxial cable None of these Microwaves Twisted pair wire Optical fibre Coaxial cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of Spanning Tree Protocol in a switched LAN? To prevent switching loops in networks with redundant switched paths To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To create collision domains To prevent routing loops in networks with redundant paths To prevent switching loops in networks with redundant switched paths To provide a mechanism for network monitoring in switched environments To manage the VLAN database across multiple switches To create collision domains To prevent routing loops in networks with redundant paths ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands sets a trunk port on a 2960 switch? switchport trunk on trunk all switchport mode trunk trunk on switchport trunk on trunk all switchport mode trunk trunk on ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which application allows a user to access and change remote files without actual transfer? None of these DNS FTP NFS TELNET None of these DNS FTP NFS TELNET ANSWER DOWNLOAD EXAMIANS APP