Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 3 and 4 2, 3 and 5 2 and 5 1 and 3 3 and 4 2, 3 and 5 2 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to gather the IP address of a remote switch that is located in Hawaii. What can you do to find the address? Issue the show cdp neighbor command on the router connected to the switch. Issue the show cdp neighbors detail command on the router connected to the switch. Issue the show ip route command on the router connected to the switch. Issue the show ip arp command on the router connected to the switch. Issue the show cdp neighbor command on the router connected to the switch. Issue the show cdp neighbors detail command on the router connected to the switch. Issue the show ip route command on the router connected to the switch. Issue the show ip arp command on the router connected to the switch. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? The copy did not override the shutdown command in running-config. You copied the wrong configuration into RAM. You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. The copy did not override the shutdown command in running-config. You copied the wrong configuration into RAM. You copied the configuration into flash memory instead. The IOS became corrupted after the copy command was initiated. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the first octet range for a class C IP address? 128 - 191 192 - 226 192 - 223 192 - 255 1 - 126 128 - 191 192 - 226 192 - 223 192 - 255 1 - 126 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select the cable that uses copper conductor, accept and transport signals in the form of electric current? Fiber-optic cable All of these Twisted pair cable Metallic cable Fiber-optic cable All of these Twisted pair cable Metallic cable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as None of these Aloha Amplitude-shift keying Amplitude Amplitude modulation None of these Aloha Amplitude-shift keying Amplitude Amplitude modulation ANSWER DOWNLOAD EXAMIANS APP