Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 3 and 4 2, 3 and 5 2 and 5 1 and 3 3 and 4 2, 3 and 5 2 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To avoid transmission errors, a check figure is calculated by the transmitting computer receiving computer both A and B None of these Start and stop bit transmitting computer receiving computer both A and B None of these Start and stop bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following device is used with an X.25 network to provide service to asynchronous terminals repeater bridges None of these Packet assembler/disassemble gateway repeater bridges None of these Packet assembler/disassemble gateway ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To set up a bulletin board system you need a smart modem with auto-answer capabilities None of these All of these a telephone line a personal computer a smart modem with auto-answer capabilities None of these All of these a telephone line a personal computer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The DoD model (also called the TCP/IP stack) has four layers. Which layer of the DoD model is equivalent to the Network layer of the OSI model? Host-to-Host Network Access Application Internet Host-to-Host Network Access Application Internet ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with? access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.172.0 0.0.31.255 access-list 10 deny 172.16.188.0 0.0.15.255 access-list 10 deny 172.16.0.0 0.0.255.255 access-list 10 deny 172.16.192.0 0.0.31.255 access-list 10 deny 172.16.172.0 0.0.31.255 ANSWER DOWNLOAD EXAMIANS APP