Computer Networking What are reasons for creating OSPF in a hierarchical design?1. To decrease routing overhead2. To speed up convergence3. To confine network instability to single areas of the network4. To make configuring OSPF easier 3 only 2, 3 nd 4 1, 2 and 3 3 and 4 3 only 2, 3 nd 4 1, 2 and 3 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the name of the network topology in which there are bi-directional links between each possible node? Ring Tree Star Mesh None of these Ring Tree Star Mesh None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You type show running-config and get this output:[output cut]Line console 0 Exec-timeout 1 35 Password BIXPASSWD Login[output cut]What do the two numbers following the exec-timeout command mean? If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. If no command has been typed in 35 seconds, the console connection will be closed. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed. If no commands have been typed in 1 minute and 35 seconds, the console connection will be closed. If no router activity has been detected in 1 hour and 35 minutes, the console will be locked out. If no command has been typed in 35 seconds, the console connection will be closed. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Most networks are connected to other local area or wide area networks. Select the best fit for answer: 255.255.252.0 Internet revolution The Internet Internet technologies Internet works 255.255.252.0 Internet revolution The Internet Internet technologies Internet works ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main purpose of a data link content monitor? None of these to determine the type of transmission used in a data link to detect problems in protocols to determine the flow of data to determine the type of switching used in a data link. None of these to determine the type of transmission used in a data link to detect problems in protocols to determine the flow of data to determine the type of switching used in a data link. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following summation operation is performed on the bits to check an error-detecting code? Attenuation Checksum Codec Coder-decoder None of these Attenuation Checksum Codec Coder-decoder None of these ANSWER DOWNLOAD EXAMIANS APP