Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 2, 3 and 5 3 and 4 1 and 3 2 and 5 2, 3 and 5 3 and 4 1 and 3 2 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? 240 248 252 192 224 240 248 252 192 224 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main purpose of a data link content monitor? to determine the type of switching used in a data link. to detect problems in protocols to determine the type of transmission used in a data link None of these to determine the flow of data to determine the type of switching used in a data link. to detect problems in protocols to determine the type of transmission used in a data link None of these to determine the flow of data ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The _____ houses the switches in token ring. None of these nine-pin connector MAU transceiver NIC None of these nine-pin connector MAU transceiver NIC ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Networks where end user workstations are tied to LAN servers to share resources and application processing. Client/Server networks Internetworked enterprise Business applications of telecommunications Information super highway Client/Server networks Internetworked enterprise Business applications of telecommunications Information super highway ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Where are EIGRP successor routes stored? In the routing table only In the neighbor table only In the routing table and the topology table In the routing table and the neighbor table In the topology table only In the routing table only In the neighbor table only In the routing table and the topology table In the routing table and the neighbor table In the topology table only ANSWER DOWNLOAD EXAMIANS APP