Computer Networking Transmission of computerised data from one location to another is called data transfer data management data communication None of these data flow data transfer data management data communication None of these data flow ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking UDP is: Connection orientated and reliable Connection oriented and unreliable Connectionless and unreliable Not a part of the TCP/IP suite None of these Connection orientated and reliable Connection oriented and unreliable Connectionless and unreliable Not a part of the TCP/IP suite None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A communications medium that uses pulses of laser light in glass fibers. Select the best fit for answer: Telecommunications software Fiber optic cables Cellular phone systems Telecommunications processors Telecommunications software Fiber optic cables Cellular phone systems Telecommunications processors ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A station in a network forwards incoming packets by placing them on its shortest output queue. What routing algorithm is being used? hot potato routing delta routing static routing None of these flooding hot potato routing delta routing static routing None of these flooding ANSWER DOWNLOAD EXAMIANS APP