Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 1 and 3 2 and 5 3 and 4 2, 3 and 5 1 and 3 2 and 5 3 and 4 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following program is used to copy files to or from another UNIX timesharing system over a single link? VMTP UUCP UART None of these TFTP VMTP UUCP UART None of these TFTP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask? 5 4 3 2 5 4 3 2 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0. What subnet should you use that supports four subnets and a maximum number of hosts? 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.252 255.255.255.192 255.255.255.240 255.255.255.224 255.255.255.248 255.255.255.252 255.255.255.192 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to subnet a network that has 5 subnets, each with at least 16 hosts. Which classful subnet mask would you use? 255.255.255.248 255.255.255.224 255.255.255.240 255.255.255.192 255.255.255.248 255.255.255.224 255.255.255.240 255.255.255.192 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If you wanted to delete the configuration stored in NVRAM, what would you type? erase running erase startup erase nvram delete nvram erase running erase startup erase nvram delete nvram ANSWER DOWNLOAD EXAMIANS APP