Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 3 and 4 2 and 5 1 and 3 2, 3 and 5 3 and 4 2 and 5 1 and 3 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network ID of 134.57.0.0 and you need to divide it into multiple subnets in which at least 600 host IDs for each subnet are available. You desire to have the largest amount of subnets available. Which subnet mask should you assign? 255.255.224.0 255.255.255.0 255.255.248.0 255.255.255.255 255.255.240.0 255.255.224.0 255.255.255.0 255.255.248.0 255.255.255.255 255.255.240.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking IEEE project 802 divides the data link layer into an upper _____ sublayer and a lower _____ sublayer. PDU, HDLC MAC, LLC None of these HDLC, PDU LLC, MAC PDU, HDLC MAC, LLC None of these HDLC, PDU LLC, MAC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Messages from one computer terminal can be sent to another by using data networks. The message to be sent is converted to an electronic digital signal, transmitted via a cable, telephone or satellite and then converted back again at the receiving end. What is this system of sending messages called? Electronic newspaper Global network Paperless office None of these Electronic mail Electronic newspaper Global network Paperless office None of these Electronic mail ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Alex is required to provide information on how many people are using the network at any one time. Which network will enable him to do so? Token-Ring Peer-to-peer Server-based Ethernet Star Token-Ring Peer-to-peer Server-based Ethernet Star ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocol is used to find the hardware address of a local device? ARP RARP ICMP IP ARP RARP ICMP IP ANSWER DOWNLOAD EXAMIANS APP