Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 2, 3 and 5 3 and 4 1 and 3 2 and 5 2, 3 and 5 3 and 4 1 and 3 2 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Ethernet and Token-Ring are the two most commonly used network architectures in the world. Jim has heard of the different topologies for networks and wants to choose the architecture that will provide him with the most options. Which of the following would that be? Choose the most correct answer. Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Ethernet, because it is cabled using fiber-optic cable Token-Ring, because it uses a MAU Token-Ring because it currently can run at both 4Mbps and 16Mbps. This means that it can be used in any topology Neither Token-Ring nor Ethernet is the proper choice. Only ARCnet can be used in all topologies Ethernet, because it can be set up with most topologies and can use multiple transfer speeds Ethernet, because it is cabled using fiber-optic cable Token-Ring, because it uses a MAU ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A network administrator wants to upgrade the IOS of a router without removing the image currently installed. What command will display the amount of memory consumed by the current IOS image and indicate whether there is enough room available to hold both the current and new images? show version show memory show flash show buffers show version show memory show flash show buffers ANSWER DOWNLOAD EXAMIANS APP
Computer Networking If the ASCII character G is sent and the character D is received, what type of error is this? recoverable None of these burst multiple-bit single-bit recoverable None of these burst multiple-bit single-bit ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the default subnet mask for a class C network? None of these 127.0.0.1 255.255.0.0 255.0.0.0 255.255.255.0 None of these 127.0.0.1 255.255.0.0 255.0.0.0 255.255.255.0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The communication mode that supports data in both directions at the same time is full-duplex multiplex half-duplex None of these simplex full-duplex multiplex half-duplex None of these simplex ANSWER DOWNLOAD EXAMIANS APP