Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 1 and 3 3 and 4 2 and 5 2, 3 and 5 1 and 3 3 and 4 2 and 5 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the port number for POP3? 80 90 110 49 80 90 110 49 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocol is used to find the hardware address of a local device? IP ICMP RARP ARP IP ICMP RARP ARP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which WAN encapsulations can be configured on an asynchronous serial connection?1. PPP2. ATM3. HDLC4. SDLC5. Frame Relay 2 and 4 All of these 3, 4 and 5 1 and 2 2 and 4 All of these 3, 4 and 5 1 and 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character H is sent and the character I is received, what type of error is this? single-bit multiple-bit burst recoverable single-bit multiple-bit burst recoverable ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2 and 4 2, 3 and 5 4 and 5 1 and 3 2 and 4 2, 3 and 5 4 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP