Computer Networking What is route poisoning? It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. It describes when a router sets the metric for a downed link to infinity. It prevents regular update messages from reinstating a route that has just come up. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It is information received from a router that can't be sent back to the originating router. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Select correct type of line configuration: Dedicated point Link Multi-point Single point Dedicated point Link Multi-point Single point ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which EIGRP information is held in RAM and maintained through the use of Hello and update packets?1. Neighbor table2. STP table3. Topology table4. DUAL table 4 only 2 only All of these 1 and 3 4 only 2 only All of these 1 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Two computers that communicate with each other use a simple parity check to detect errors for ASCII transmissions. Which of the following events will always lead to an undeleted error? one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a block during transmission None of these two bits or any even number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a block of data during transmission two bits or any even number of bits inverted in a block during transmission None of these two bits or any even number of bits inverted in a byte during transmission one bit or any odd number of bits inverted in a byte during transmission ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Data communications system depends on four fundamental characteristics Receiver Timeliness Sender Medium Receiver Timeliness Sender Medium ANSWER DOWNLOAD EXAMIANS APP
Computer Networking An error detecting code is which code is the remainder resulting from dividing the bits to be checked by a predetermined binary number, is known as Checksum Error rate None of these Error detecting code Cyclic redundancy check Checksum Error rate None of these Error detecting code Cyclic redundancy check ANSWER DOWNLOAD EXAMIANS APP