Computer Networking Which of the following modes are valid when a switch port is used as a VLAN trunk?1. Blocking2. Dynamic auto3. Dynamic desirable4. Nonegotiate5. Access6. Learning 1, 2 and 6 2, 4, and 5 2, 3 and 4 4, 5 and 6 1, 2 and 6 2, 4, and 5 2, 3 and 4 4, 5 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Acknowledgments, sequencing, and flow control are characteristics of which OSI layer? Layer 2 Layer 4 Layer 3 Layer 7 Layer 2 Layer 4 Layer 3 Layer 7 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is required to communicate between two computers? protocol communications hardware access to transmission medium communications software All of these protocol communications hardware access to transmission medium communications software All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? 255.255.255.248 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.248 255.255.255.192 255.255.255.224 255.255.255.240 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The probability that a single bit will be in error on a typical public telephone line using 4800 bps modem is 10 to the power -3. If no error detection mechanism is used, the residual error rate for a communication line using 9-bit frames is approximately equal to 0.003 0.999 0.991 0.009 None of these 0.003 0.999 0.991 0.009 None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 192.168.10.0 and require at least 25 host IDs for each subnet, with the largest amount of subnets available. Which subnet mask should you assign? 255.255.255.255 255.255.255.248 255.255.255.192 255.255.255.224 255.255.255.240 255.255.255.255 255.255.255.248 255.255.255.192 255.255.255.224 255.255.255.240 ANSWER DOWNLOAD EXAMIANS APP