Computer Networking What is route poisoning? It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking For data communications to occur, the communicating devices must be part of a communication system made up of a combination of? WAN and LAN Full duplex and half duplex All of these Hardware and software WAN and LAN Full duplex and half duplex All of these Hardware and software ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following allows a router to respond to an ARP request that is intended for a remote host? Reverse ARP (RARP) Gateway DP Proxy ARP Inverse ARP (IARP) Reverse ARP (RARP) Gateway DP Proxy ARP Inverse ARP (IARP) ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With an IP address of 100, you currently have 80 subnets. What subnet mask should you use to maximize the number of available hosts? 252 248 224 240 192 252 248 224 240 192 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? two bits or any even number of bits inverted in a block during transmission one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a byte during transmission None of these two bits or any even number of bits inverted in a block during transmission one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a byte during transmission None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following characteristic(s) is/are suited to the PSS applications? Multiple remote host or applications accessed by a single local access circuit terminal and circuit bursty traffic and low communications intensity All of these None of these widely dispersed terminals and access to international packets switched services Multiple remote host or applications accessed by a single local access circuit terminal and circuit bursty traffic and low communications intensity All of these None of these widely dispersed terminals and access to international packets switched services ANSWER DOWNLOAD EXAMIANS APP