Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 3 and 4 2 and 5 1 and 3 2, 3 and 5 3 and 4 2 and 5 1 and 3 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transport layer protocol is connectionless. None of these UDP NVT FTP TCP None of these UDP NVT FTP TCP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is a wrong example of network layer? Internet Protocol (IP) - ARPANET Source routing and domain naming-USENet X.25 Packet Level Protocol (PLP)-ISO X.25 level 2-ISO Internet Protocol (IP) - ARPANET Source routing and domain naming-USENet X.25 Packet Level Protocol (PLP)-ISO X.25 level 2-ISO ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Repeaters are often used on an 802.3 network to help strengthen the signals being transmitted. As with the length of segments and the number of segments, a limit exists as to how many repeaters can be used between any two nodes. What is the maximum number of repeaters that can be used? Three Five Two Four Six Three Five Two Four Six ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the first octet range for a class B IP address? 128 - 255 192 - 223 128 - 191 127 - 191 1 - 127 128 - 255 192 - 223 128 - 191 127 - 191 1 - 127 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following protocols are used to configure trunking on a switch?1. VLAN Trunk Protocol2. VLAN3. 802.1Q4. ISL 3 and 4 1 only 3 only 1, 3 and 4 3 and 4 1 only 3 only 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP