____ is the process of using either ISL or 802.1q to allow multiple VLAN traffic on the same link.

A. Trunking
B. Access list
C. Forwarding
D. Pruning


Answer: A

Computer Science & Information Technology

You might also like to view...

Write a recursive version of this iterative function:

What will be an ideal response? ``` int g(int n) { int h = 1; while (n > 1) { h = h * n; n--; } return h; } ```

Computer Science & Information Technology

Labels are text data values entered at the top of a column or the beginning of a row to clarify the data in the worksheet

Indicate whether the statement is true or false.

Computer Science & Information Technology

The operating system controls how your computer functions.

Answer the following statement true (T) or false (F)

Computer Science & Information Technology

The pointer technique:

a. Points to the correct value in an array by supplying the element number. b. Uses the value of an element in one array as the element number in another array. c. Finds the last element in an array with a value other than zero. d. Allows the developer to point to any element in any array given the element number.

Computer Science & Information Technology