Computer Networking What is route poisoning? It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What protocols are used to configure trunking on a switch?1. VLAN Trunking Protocol2. VLAN3. 802.1Q4. ISL 1 and 2 1 only 3 and 4 2 only 1 and 2 1 only 3 and 4 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Devices on one network can communicate with devices on another network via a printer server gateway file server None of these utility server printer server gateway file server None of these utility server ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which protocol is used to send a destination network unknown message back to originating hosts? ARP BootP TCP ICMP ARP BootP TCP ICMP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The _____ layer is the layer closest to the transmission medium. None of these data link physical network transport None of these data link physical network transport ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is required to communicate between two computers? protocol communications software access to transmission medium communications hardware All of these protocol communications software access to transmission medium communications hardware All of these ANSWER DOWNLOAD EXAMIANS APP