Computer Networking What is route poisoning? It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. It prevents regular update messages from reinstating a route that has just come up. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In CRC there is no error if the remainder at the receiver is _____. zero nonzero None of these the quotient at the sender equal to the remainder at the sender zero nonzero None of these the quotient at the sender equal to the remainder at the sender ANSWER DOWNLOAD EXAMIANS APP
Computer Networking A distributed network configuration in which all data/information pass through a central computer is bus network ring network Point-to-point network None of these star network bus network ring network Point-to-point network None of these star network ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The standard suit of protocols used by the Internet, intranets, extranets, and some other networks. Internetwork processor Open Systems Hybrid hub Protocol TCP/IP Internetwork processor Open Systems Hybrid hub Protocol TCP/IP ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 5 protocols Layer 4 protocols None of these Layer 7 protocols Layer 6 protocols Layer 5 protocols Layer 4 protocols None of these Layer 7 protocols Layer 6 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The fundamental requirements of private-to-public network interconnection methods which need to be provided in gateways is/are None of these A and B both adequate cost control mechanisms for administration of the private networks universal accessibility for private network Data Terminal Equipment (DTE) to assign address to private network DTEs None of these A and B both adequate cost control mechanisms for administration of the private networks universal accessibility for private network Data Terminal Equipment (DTE) to assign address to private network DTEs ANSWER DOWNLOAD EXAMIANS APP