Computer Networking Which of the following are types of flow control?1. Buffering2. Cut-through3. Windowing4. Congestion avoidance 3 only 2 only 1 and 2 1, 3 and 4 3 only 2 only 1 and 2 1, 3 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking In OSI network architecture, the dialogue control and token management are responsibilities of data link layer None of these network layer transport layer session layer data link layer None of these network layer transport layer session layer ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to find the broadcast address used on a LAN on your router. What command will you type into the router from user mode to find the broadcast address? show startup-config show interfaces show running-config show protocols show startup-config show interfaces show running-config show protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What does RIPv2 use to prevent routing loops?1. CIDR2. Split horizon3. Authentication4. Classless masking5. Holddown timers 2, 3 and 5 3 and 4 2 and 5 1 and 3 2, 3 and 5 3 and 4 2 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which two statements describe the IP address 10.16.3.65/23?1. The subnet address is 10.16.3.0 255.255.254.0.2. The lowest host address in the subnet is 10.16.2.1 255.255.254.0.3. The last valid host address in the subnet is 10.16.2.254 255.255.254.0.4. The broadcast address of the subnet is 10.16.3.255 255.255.254.0. 2, 3 and 4 2 and 5 only 1 and 3 1, 2 and 4 2 and 4 2, 3 and 4 2 and 5 only 1 and 3 1, 2 and 4 2 and 4 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Intranets and extranets can use their network fire walls and other security features to establish secure Internet links within an enterprise or with its trading partners. Select the best fit for answer: Network operating system Network Server Virtual Private Network OSI Network operating system Network Server Virtual Private Network OSI ANSWER DOWNLOAD EXAMIANS APP