Computer Networking Business meeting and conferences can be held by linking distantly located people through a computer network. Not only the participants exchange information but are able to see each other. What is it called? Teletalking Telemailing Telemeeting None of these Teleconferencing Teletalking Telemailing Telemeeting None of these Teleconferencing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statement is true regarding classless routing protocols?1. The use of discontiguous networks is not allowed.2. The use of variable length subnet masks is permitted.3. RIPv1 is a classless routing protocol.4. IGRP supports classless routing within the same autonomous system.5. RIPv2 supports classless routing. 3 and 4 None of these 1, 3 and 5 2 and 5 3 and 4 None of these 1, 3 and 5 2 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which three statements are true about the operation of a full-duplex Ethernet network?1. There are no collisions in full-duplex mode.2. A dedicated switch port is required for each full-duplex node.3. Ethernet hub ports are preconfigured for full-duplex mode.4. In a full-duplex environment, the host network card must check for the availability of the network media before transmitting.5. The host network card and the switch port must be capable of operating in full-duplex mode. 2 and 4 2, 3 and 4 5 only 1, 2, and 5 2 and 4 2, 3 and 4 5 only 1, 2, and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It is information received from a router that can't be sent back to the originating router. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking When data is encapsulated, which is the correct order? Segment, data, packet, frame, bit Data, frame, packet, segment, bit Data, segment, frame, packet, bit Data, segment, packet, frame, bit Segment, data, packet, frame, bit Data, frame, packet, segment, bit Data, segment, frame, packet, bit Data, segment, packet, frame, bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command is used to create a backup configuration? copy running-config startup-config copy running backup wr mem config mem copy running-config startup-config copy running backup wr mem config mem ANSWER DOWNLOAD EXAMIANS APP