Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 2 only 1 only 3 and 4 1 and 2 2 only 1 only 3 and 4 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an important characteristic of LAN? None of these low cost access for low bandwidth channels application independent interfaces unlimited expansion parallel transmission None of these low cost access for low bandwidth channels application independent interfaces unlimited expansion parallel transmission ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In CRC there is no error if the remainder at the receiver is _____. the quotient at the sender equal to the remainder at the sender nonzero zero None of these the quotient at the sender equal to the remainder at the sender nonzero zero None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In a network with dozens of switches, how many root bridges would you have? 12 5 1 2 12 5 1 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What are the distinct functions of layer 2 switching that increase available bandwidth on the network?1. Address learning2. Routing3. Forwarding and filtering4. Creating network loops5. Loop avoidance6. IP addressing 3 and 5 2 and 6 1, 3 and 5 2, 4 and 6 3 and 5 2 and 6 1, 3 and 5 2, 4 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands will allow you to set your Telnet password on a Cisco router? line vty 0 4 line aux 0 4 line telnet 0 4 line con 0 line vty 0 4 line aux 0 4 line telnet 0 4 line con 0 ANSWER DOWNLOAD EXAMIANS APP