Computer Networking The topology with highest reliability is: Star topology Ring topology Mesh topology Bus topology Star topology Ring topology Mesh topology Bus topology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following are benefits of VLANs?1. They increase the size of collision domains.2. They allow logical grouping of users by function.3. They can enhance network security.4. They increase the size of broadcast domains while decreasing the number of collision domains.5. They simplify switch administration.6. They increase the number of broadcast domains while decreasing the size of the broadcast domains. 1 and 5 1, 3 and 5 2 and 4 2, 3 and 6 1 and 5 1, 3 and 5 2 and 4 2, 3 and 6 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Identify the odd term amongst the following group: Coaxial cable Twisted pair wire None of these Microwaves Optical fibre Coaxial cable Twisted pair wire None of these Microwaves Optical fibre ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are None of these A and B both to assign address to private network DTEs adequate cost control mechanisms for administration of the private networks universal accessibility for private network Data Terminal Equipment (DTE) None of these A and B both to assign address to private network DTEs adequate cost control mechanisms for administration of the private networks universal accessibility for private network Data Terminal Equipment (DTE) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking OSI model means: Operating system interconnection Open source interconnection Operating source interconnection Open systems interconnection Operating system interconnection Open source interconnection Operating source interconnection Open systems interconnection ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. ANSWER DOWNLOAD EXAMIANS APP