Computer Networking What are reasons for creating OSPF in a hierarchical design?1. To decrease routing overhead2. To speed up convergence3. To confine network instability to single areas of the network4. To make configuring OSPF easier 3 and 4 3 only 2, 3 nd 4 1, 2 and 3 3 and 4 3 only 2, 3 nd 4 1, 2 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The Token-Ring architecture was developed for a more efficient way to determine who should be transmitting at any one time. With Ethernet, collisions may take place, causing the transmitting computers to have to retransmit their data. The use of token guarantees that only one computer can transmit at a time. What happens as the network increases in size? Choose the best answer The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient The speed of the Token-Ring network must be 16Mbps if the number of nodes is greater then 500 An additional token is added for every 1,000 nodes The network becomes more efficient After the number of nodes exceeds 550, the Multistation Access Unit must be replaced by the more powerful Hyperstation Unified Bandwidth device The network becomes less efficient ANSWER DOWNLOAD EXAMIANS APP
Computer Networking After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration? Ping the address of the local host Ping the broadcast address None of these Ping the Microsoft Web site Ping a distant router. Ping the address of the local host Ping the broadcast address None of these Ping the Microsoft Web site Ping a distant router. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error-detecting code inserted as a field in a block of data to be transmitted is known as flow control Checksum Frame check sequence None of these Error detecting code flow control Checksum Frame check sequence None of these Error detecting code ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A T-switch is used to control how messages are passed between computers rearrange the connections between computing equipment None of these echo every character that is received transmit characters one at a time control how messages are passed between computers rearrange the connections between computing equipment None of these echo every character that is received transmit characters one at a time ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. The IOS became corrupted after the copy command was initiated. You copied the configuration into flash memory instead. You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. The IOS became corrupted after the copy command was initiated. You copied the configuration into flash memory instead. ANSWER DOWNLOAD EXAMIANS APP