Computer Networking Which command will display all the EIGRP feasible successor routes known to a router? show ip eigrp topology show ip eigrp adjacencies show ip routes * show ip eigrp summary show ip eigrp topology show ip eigrp adjacencies show ip routes * show ip eigrp summary ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The main difference between synchronous and asynchronous transmission is None of these the pulse height is different. the clocking is mixed with the data in asynchronous transmission the bandwidth required is different the clocking is derived from the data in synchronous transmission None of these the pulse height is different. the clocking is mixed with the data in asynchronous transmission the bandwidth required is different the clocking is derived from the data in synchronous transmission ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which statements are true regarding ICMP packets?1. They acknowledge receipt of a TCP segment.2. They guarantee datagram delivery.3. They can provide hosts with information about network problems.4. They are encapsulated within IP datagrams. 3 and 4 2 and 3 1 only 2, 3 and 4 3 and 4 2 and 3 1 only 2, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How does a host on an Ethernet LAN know when to transmit after a collision has occurred?1. In a CSMA/CD collision domain, multiple stations can successfully transmit data simultaneously.2. In a CSMA/CD collision domain, stations must wait until the media is not in use before transmitting.3. You can improve the CSMA/CD network by adding more hubs.4. After a collision, the station that detected the collision has first priority to resend the lost data.5. After a collision, all stations run a random backoff algorithm. When the backoff delay period has expired, all stations have equal priority to transmit data. 1 and 3 1,3 and 4 2 and 5 2 and 4 1 and 3 1,3 and 4 2 and 5 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The data communication support should include, but is not restricted to file and database access All of these terminal support, electronic mail and voice grams. file transfer and transaction processing file and database access All of these terminal support, electronic mail and voice grams. file transfer and transaction processing ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use? access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 access-list 10 deny 192.168.160.0 0.0.31.255 access-list 10 deny 192.168.0.0 0.0.31.255 access-list 10 deny 192.168.160.0 0.0.191.255 access-list 10 deny 192.168.160.0 255.255.224.0 ANSWER DOWNLOAD EXAMIANS APP