Computer Networking
Which of the following technique is used for fragment?

None of these
a technique used in best-effort delivery systems to avoid endlessly looping packets
All of these
a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame
one of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
If a switch receives a frame and the source MAC address is not in the MAC address table but the destination address is, what will the switch do with the frame?

Discard it and send an error message back to the originating host
Add the destination to the MAC address table and then forward the frame
Add the source address and port to the MAC address table and forward the frame out the destination port
Flood the network with the frame

ANSWER DOWNLOAD EXAMIANS APP

Computer Networking
You get a call from a network administrator who tells you that he typed the following into his router:Router (config) #router ospf 1Router (config-router) #network 10.0.0.0 255.0.0.0 area 0He tells you he still can't see any routes in the routing table. What configuration error did the administrator make?

The OSPF Process ID is incorrect.
The wildcard mask is incorrect.
The AS configuration is wrong.
The OSPF area is wrong.

ANSWER DOWNLOAD EXAMIANS APP