Computer Networking What command is used to create a backup configuration? wr mem copy running-config startup-config copy running backup config mem wr mem copy running-config startup-config copy running backup config mem ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transmission signal coding method of TI carrier is called Bipolar Binary NRZ Manchester None of these Bipolar Binary NRZ Manchester None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many OSI layers are covered in the X.25 standard? None of these seven three six two None of these seven three six two ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To connect a computer with a device in the same room, you might be likely to use a dedicated line None of these a ground station All of these a coaxial cable a dedicated line None of these a ground station All of these a coaxial cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 1 and 3 2 and 5 2, 3 and 5 3 and 4 1 and 3 2 and 5 2, 3 and 5 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many bits internet address is assigned to each host on a TCP/IP internet which is used in all communications with the host? 64 - bits 48 - bits 16 - bits None of these 32 - bits 64 - bits 48 - bits 16 - bits None of these 32 - bits ANSWER DOWNLOAD EXAMIANS APP