Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 3 and 4 2 and 5 2, 3 and 5 1 and 3 3 and 4 2 and 5 2, 3 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is not a standard synchronous communication protocol? PAS SMTP SLIP SDLC None of these PAS SMTP SLIP SDLC None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The _____ layer is the layer closest to the transmission medium. transport data link None of these network physical transport data link None of these network physical ANSWER DOWNLOAD EXAMIANS APP
Computer Networking After you have verified that TCP/IP is installed correctly, what is the next step in verifying the TCP/IP configuration? Ping the broadcast address Ping the address of the local host Ping the Microsoft Web site Ping a distant router. None of these Ping the broadcast address Ping the address of the local host Ping the Microsoft Web site Ping a distant router. None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: Virtual Private Network Network operating system Network Server OSI Virtual Private Network Network operating system Network Server OSI ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which fields are contained within an IEEE Ethernet frame header?1. Source and destination MAC address2. Source and destination network address3. Source and destination MAC address and source and destination network address4. FCS field 2 and 3 only 2 only 3 only 1 and 4 2 and 3 only 2 only 3 only 1 and 4 ANSWER DOWNLOAD EXAMIANS APP