Computer Networking Which EIGRP information is held in RAM and maintained through the use of Hello and update packets?1. Neighbor table2. STP table3. Topology table4. DUAL table 4 only 2 only All of these 1 and 3 4 only 2 only All of these 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following command options are displayed when you use the Router# show frame-relay ? command?1. dlci2. neighbors3. lmi4. pvc5. map 1 only 3, 4 and 5 2 and 4 All of these 1 only 3, 4 and 5 2 and 4 All of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Modulation in which the two binary values are represented by two different amplitudes of the carrier frequency is known as Amplitude modulation None of these Aloha Amplitude Amplitude-shift keying Amplitude modulation None of these Aloha Amplitude Amplitude-shift keying ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the purpose of flow control? To regulate the size of each segment. To provide a means for the receiver to govern the amount of data sent by the sender. To reassemble segments in the correct order at the destination device. To ensure that data is retransmitted if an acknowledgment is not received. To regulate the size of each segment. To provide a means for the receiver to govern the amount of data sent by the sender. To reassemble segments in the correct order at the destination device. To ensure that data is retransmitted if an acknowledgment is not received. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which network topology is considered passive? Star Bus Mesh Cross Ring Star Bus Mesh Cross Ring ANSWER DOWNLOAD EXAMIANS APP
Computer Networking On a class B network, how many subnets are available with a subnet mask of 248? 62 30 126 6 2 62 30 126 6 2 ANSWER DOWNLOAD EXAMIANS APP