Computer Networking Which of the following are TCP/IP protocols used at the Application layer of the OSI model?1. IP2. TCP3. Telnet4. FTP5. TFTP All of these 1 and 3 1, 3 and 5 3, 4 and 5 All of these 1 and 3 1, 3 and 5 3, 4 and 5 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data communications system depends on four fundamental characteristics Receiver Timeliness Medium Sender Receiver Timeliness Medium Sender ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Different computers are connected to a LAN by a cable and a/an telephone lines interface card modem None of these special wires telephone lines interface card modem None of these special wires ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is route poisoning? It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the maximum number of entries in the HOSTS file? 255 8 500 Unlimited None of these 255 8 500 Unlimited None of these ANSWER DOWNLOAD EXAMIANS APP