Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 3 only 1, 3 and 4 1 and 2 2 only 3 only 1, 3 and 4 1 and 2 2 only ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be? The IOS became corrupted after the copy command was initiated. You copied the configuration into flash memory instead. You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. The IOS became corrupted after the copy command was initiated. You copied the configuration into flash memory instead. You copied the wrong configuration into RAM. The copy did not override the shutdown command in running-config. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking To back up an IOS, what command will you use? copy tftp flash copy ios tftp backup IOS disk copy flash tftp copy tftp flash copy ios tftp backup IOS disk copy flash tftp ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Frames from one LAN can be transmitted to another LAN via the device Repeater Router None of these Bridge Modem Repeater Router None of these Bridge Modem ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following device is used to connect two systems, especially if the systems use different protocols? hub bridge None of these repeater gateway hub bridge None of these repeater gateway ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 2 and 5 1 and 3 3 and 4 2, 3 and 5 2 and 5 1 and 3 3 and 4 2, 3 and 5 ANSWER DOWNLOAD EXAMIANS APP