Computer Networking Which of the following describe router functions? Packet filtering All of these Packet switching Internetwork communication Path selection Packet filtering All of these Packet switching Internetwork communication Path selection ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Correct method for full duplex mode of communication is: Both stations can transmit and receive data at the One device sends and other device receives and vic None of these One device can send other device can only accepts. Both stations can transmit and receive data at the One device sends and other device receives and vic None of these One device can send other device can only accepts. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The difference between a multiplexer and a statistical multiplexer is None of these Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Statistical multiplexers need buffers while multiplexers do not need buffers None of these Multiplexers often waste the output link capacity while statistical multiplexers optimize its use Multiplexer use X.25 protocol, while statistical multiplexers use the Aloha protocol Multiplexers use Time Division Multiplexing (TDM) while statistical multiplexers use Frequency Division Multiplexing (FDM) Statistical multiplexers need buffers while multiplexers do not need buffers ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What command is used to create a backup configuration? copy running backup wr mem config mem copy running-config startup-config copy running backup wr mem config mem copy running-config startup-config ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to determine whether IP information has been assigned to your Windows NT. Which utility should you use? PING IPCONFIG NETSTAT WINIPCFG NBTSTAT PING IPCONFIG NETSTAT WINIPCFG NBTSTAT ANSWER DOWNLOAD EXAMIANS APP