Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 1 and 3 2, 3 and 5 3 and 4 2 and 5 1 and 3 2, 3 and 5 3 and 4 2 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The data-link layer, in reference to the OSI model, specifies the interface between the X.25 network and packet mode device All of these the virtual circuit interface to packet-switched service data link procedures that provide for the exchange of data via frames that can be sent and received None of these the interface between the X.25 network and packet mode device All of these the virtual circuit interface to packet-switched service data link procedures that provide for the exchange of data via frames that can be sent and received None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 172.16.0.0, and you require 25 subnets for your company and an additional 30 for the company that will merge with you within a month. Each network will contain approximately 600 nodes. What subnet mask should you assign? 255.255.192.0 255,255.248.0 255.255.224.0 255.255.240.0 255.255.252.0 255.255.192.0 255,255.248.0 255.255.224.0 255.255.240.0 255.255.252.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Operating system functions may include input/output control virtual storage All of these multiprogramming None of these input/output control virtual storage All of these multiprogramming None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Communication between computers is almost always series parallel None of these parallel direct serial series parallel None of these parallel direct serial ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Error detection at the data link level is achieved by Hamming Code Cyclic Redundancy Code Equalization Bit Stuffing Hamming Code Cyclic Redundancy Code Equalization Bit Stuffing ANSWER DOWNLOAD EXAMIANS APP