A virtual local areanetwork (VLAN) is configured by _________.
A)
software
B)
physical wiring
C)
hardware
D)
none of the abov

1 Answer

Answer :

software

Related questions

Description : Which of the following is not describedas a typicalnetwork classification? A) Local areanetwork B) Wide area network C) Metropolitan areanetwork D) County area networ

Last Answer : County area network

Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove

Last Answer : all of theabove

Description : _________ utilization is the useof availablebandwidthto achieve specificgoals. A) Frequency B) Bandwidth C) Amplitude D) None of the abov

Last Answer : Bandwidth

Description : In IPv6,a ______address is used ifa site with several networks uses the Internetprotocols but is not connectedto the Internet for security reasons. A) link local B) site local C) mapped D) none of the abov

Last Answer : site local

Description : Bluetooth is a _______ technology that connects devices (called gadgets) ina small area. A) wired LAN B) wirelessLAN C) VLAN D) none of the above

Last Answer : wirelessLAN

Description : The …………………... option tells netstat to display the status of all configured network interfaces. A. -n B. -i C. either a or b D. neither a nor b

Last Answer : B. -i

Description : _________ is a data area shared by hardware devices or program processes that operate at different speeds or with different sets of priorities. A. Flash memory B. Virtual memory C. Buffer D. None of the Above

Last Answer : C. Buffer

Description : A _________ network is across between a circuit-switchednetworkand a datagram network. It has some characteristics ofboth. A) virtual-circuit B) packet-switched C) frame-switched D) none of the above

Last Answer : virtual-circui

Description : In ATM,a virtual connection is definedby _________. A) VPI B) VCI C) DLCI D) acombination of (a) and (b)

Last Answer : acombination of (a) and (b)

Description : In a ________ network, twotypes of addressing are involved: global and local. A) virtual-circuit B) datagram C) circuit-switched D) none of the above

Last Answer : virtual-circuit

Description : Bluetooth is an example of __________ a) personal area network b) local area network c) virtual private network d) wide area network

Last Answer : a) personal area network

Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol used to monitor computers

Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol that handles error andcontrol messages

Description : The physical layer translates logical communication requests from the ______ into hardware specific operations. a. data link layer b. network layer c. trasnport layer d. application layer

Last Answer : a. data link layer

Description : The most basic function of ifconfig command is assigning the …………….. Address. A. Physical address B. Hardware address C. MAC address D. IP address

Last Answer : D. IP address

Description : Floppy disks typically in diameter a. 3‛ b. 5.25‛ c. 8‛ d. All of abov

Last Answer : All of abov

Description : The maximum frame length for 10-Mbps Ethernet is ________ bytes. A) 1518 B) 1500 C) 1200 D) none of the abov

Last Answer : 1518

Description : A bridge can use the _________algorithm tocreate aloopless topology. A) binary tree B) spanning tree C) multiway tree D) none of the abov

Last Answer : spanning tree

Description : ___ cable can carry signals ofhigher frequency ranges than_____ cable. A) Twisted-pair; fiber-optic B) Coaxial; fiber-optic C) Coaxial; twisted-pair D) none of the abov

Last Answer : Coaxial; twisted-pair

Description : In_________ transmission, we send bits oneafter another without startor stop bits or gaps. It is the responsibilityof the receiver togroup the bits. A) synchronous B) asynchronous C) isochronous D) none of the abov

Last Answer : synchronous

Description : ______ finds the value of thesignal amplitudefor eachsample; ____ finds the change from the previous sample. A) DM; PCM B) PCM; DM C) DM; CM D) none of the abov

Last Answer : PCM; DM

Description : The most common technique to change an analog signal to digitaldata is called __________. A) PAL B) PCM C) sampling D) none of the abov

Last Answer : PCM

Description : In IPv6,options are inserted between the _________and the ___________ data. A) baseheader;extensionheader B) baseheader;upper-layer data C) base header; frame header D) noneof the abov

Last Answer : baseheader;upper-layer data

Description : In SQL, which command(s) is(are) used to change atable's storage characteristics? A. ALTER TABLE B. MODIFY TABLE C. CHANGE TABLE D. All of theabove E. None of the abov

Last Answer : ALTER TABLE

Description : _____defines how a particular pattern to be interpreted,and whataction is tobe taken based on that interpretation. A) Semantics B) Syntax C) Timing D) None of the abov

Last Answer : Semantics

Description : An error in software or hardware is called a bug. What is the alternative computer jargon for it? a. Leech b. Squid c. Slug d. Glitch

Last Answer : Glitch

Description : Software in computer a. Enhances the capabilities of the hardware machine b. Increase the speed of central processing unit c. Both of above d. None of above

Last Answer : Enhances the capabilities of the hardware machine

Description : Which of the following is required to communicate between two computers? a. communications software b. protocol c. communication hardware d. all of above including access to transmission medium

Last Answer : all of above including access to transmission medium

Description : The performance of data communications network depends on .............. A) Number of users B) The hardware and software C) The transmission D) All of the above

Last Answer : D) All of the above

Description : Which of the following is another name for the system virtual machine? a) hardware virtual machine b) software virtual machine c) real machine d) none of the mentioned

Last Answer : hardware virtual machine

Description : Which of the following is another name for the system virtual machine? a) hardware virtual machine b) software virtual machine c) real machine d) none of the mentioned

Last Answer : hardware virtual machine

Description : Which of the following is another name for the system virtual machine? a) hardware virtual machine b) software virtual machine c) real machine d) none of the mentioned

Last Answer : VMM

Description : _________ media transportelectromagnetic waves without the use ofa physical conductor. A) Guided B) Unguided C) Either (a) or (b) D) None of the above

Last Answer : Unguided

Description : The data link layer takes the packets from _________ and encapsulates them into frames for transmission. a) network layer b) physical layer c) transport layer d) application layer

Last Answer : a) network layer

Description : A ________is a local address. Its jurisdiction is overa local network. A) physical B) logical C) a and b D) noneof the above

Last Answer : physical

Description : _________ is a generic term for organized collection of computer data and instructions. A. firmware B. Software C. hardware D. None of the above

Last Answer : B. Software

Description : _________ is a combination of hardware and software that facilitates the sharing of information between computing devices. a) Network b) Peripheral c) Expansion Board d) Digital Device

Last Answer : a) Network

Description : The _________ of a system includes the programs or instructions 1) Hardware 2) Icon 3) Information 4) Software

Last Answer : 4) Software

Description : A _________ is a cloud computing service that is both hardware and software. a) service b)platform c) model d) all of the mentioned

Last Answer : platform

Last Answer : VLAN - Virtual Local Area Network

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1) DSL modem 2) A multi-homed firewall 3) VLAN 4) A brouter that acts both as a bridge and a router

Last Answer : 2) A multi-homed firewall

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : Mention what are the networking options used in OpenStack a. Flat Network Manager: IP addresses for VM instances are fetched from the subnet, and then injected into the image on launch b. Flat DHCP Network ... is started for each VLAN to pass out IP addresses to VM instances. d. All of the above

Last Answer : All of the above

Description : Your company receives internet access through a network or a gateway server. Which of the following devices is best suited to protect resources and subnet your LAN directly on the network server? 1 DSL modem 2 A multi-homed firewall 3 VLAN 4 A brouter that acts both as a bridge and a router

Last Answer : 2 A multi-homed firewall

Description : The physical devices of a computer: a) Software b) Package c) Hardware d) System Software

Last Answer : Answer: c Explanation: Hardware refers to the physical devices of a computer system. Software refers to a collection of programs. A program is a sequence of instructions

Description : Physical security is concerned with protecting computer hardware from human tampering and natural disasters and _____security is concerned with protecting software from unauthorized tampering or damage: a) Data b) Cyber c) Internet d) Meta Physical e) Publicity

Last Answer : b) Cyber

Description : Physical components that make up your computer are known as ..... 1) Operating Systems 2) Software 3) Hardware 4) Web Browsers

Last Answer : 3) Hardware

Description : Which of the following is not the responsibility of the utilities component of DBMS software? A. creating the physical and logicaldesigns B. removingflaggedrecords for deletion C. creatingand maintaining the data dictionary D. monitoring performance E. None of the above

Last Answer : creating the physical and logicaldesigns

Description : How do I remove an Ethernet alias which is not configured?

Last Answer : What is it you are actually trying to remove, something virtual, IE, a program, or something physical, or disable something physical like a video card, etc?