Computer Networking Which of the following layer protocols are responsible for user and the application programme support such as passwords, resource sharing, file transfer and network management? Layer 4 protocols Layer 5 protocols None of these Layer 7 protocols Layer 6 protocols Layer 4 protocols Layer 5 protocols None of these Layer 7 protocols Layer 6 protocols ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 1 and 3 3, 4 and 5 1 and 4 2 and 3 1 and 3 3, 4 and 5 1 and 4 2 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking How many non-overlapping channels are available with 802.11a? 12 3 23 40 12 3 23 40 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking The transport layer protocol is connectionless. UDP NVT FTP TCP None of these UDP NVT FTP TCP None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Microprogramming is assembly language programming control unit programming macro programming of microcomputers programming of minicomputers None of these assembly language programming control unit programming macro programming of microcomputers programming of minicomputers None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Working of the WAN generally involves satellites telephone lines None of these microwaves All of these satellites telephone lines None of these microwaves All of these ANSWER DOWNLOAD EXAMIANS APP