Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 3 and 4 1 only 2 only 1 and 2 3 and 4 1 only 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When creating a pool of global addresses, which of the following can be used instead of the netmask command? no mask prefix-length / (slash notation) block-size no mask prefix-length / (slash notation) block-size ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following signals is not standard RS - 232-C signal? None of these RTS VDR DSR CTS None of these RTS VDR DSR CTS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In OSI model, which of the following layer transforms information from machine format into that understandable by user application None of these presentation physical session application None of these presentation physical session ANSWER DOWNLOAD EXAMIANS APP
Computer Networking End-to-end connectivity is provided from host-to-host in: Network layer Transport layer None of these Data link layer Session layer Network layer Transport layer None of these Data link layer Session layer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A required characteristic of an online real-time system is: no delay in processing All of these more than one CPU offline batch processing None of these no delay in processing All of these more than one CPU offline batch processing None of these ANSWER DOWNLOAD EXAMIANS APP