Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 1 and 3 2, 3 and 5 2 and 5 3 and 4 1 and 3 2, 3 and 5 2 and 5 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 1 only 1, 3 and 4 3 only 3 and 4 1 only 1, 3 and 4 3 only 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which two of the following commands will place network 10.2.3.0/24 into area 0?1. router eigrp 102. router ospf 103. network 10.0.0.04. network 10.2.3.0 0.0.0.255 area05. network 10.2.3.0 0.0.0.255 area 0 2, 4, and 5 3 and 4 2 and 5 1 and 4 2, 4, and 5 3 and 4 2 and 5 1 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The amount of uncertainty in a system of symbol is called Bandwidth Entropy loss Quantum None of these Bandwidth Entropy loss Quantum None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The coming together of three technologies i.e. microelectronics, computing and communications has ushered in business revolution educational upgradation None of these information explosion information technology business revolution educational upgradation None of these information explosion information technology ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To avoid transmission errors, a check figure is calculated by the transmitting computer receiving computer Start and stop bit None of these both A and B transmitting computer receiving computer Start and stop bit None of these both A and B ANSWER DOWNLOAD EXAMIANS APP