Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 2, 3 and 5 2 and 5 3 and 4 1 and 3 2, 3 and 5 2 and 5 3 and 4 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an example of bounded medium? Coaxial cable All of these None of these Wave guide Coaxial cable All of these None of these Wave guide ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In communication satellite, multiple repeaters are known as detector stations modulator None of these transponders detector stations modulator None of these transponders ANSWER DOWNLOAD EXAMIANS APP
Computer Networking We can receive data either through our television aerial or down our telephone lines and display this data on our television screen. What is the general name given to this process? Telesoftware None of these Videotex Teletext Viewdata Telesoftware None of these Videotex Teletext Viewdata ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The basic Ethernet design does not provide None of these addressing multiple virtual networks access control automatic retransmission of a message None of these addressing multiple virtual networks access control automatic retransmission of a message ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that is 172.16.0.0 and would like to have the maximum number of hosts per subnet. This assumes support for eight subnets. What subnet mask should you use? 255.255.255.0 255.255.224.0 255.255.248.0 255.255.192.0 255.255.240.0 255.255.255.0 255.255.224.0 255.255.248.0 255.255.192.0 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP