Computer Networking What is route poisoning? It describes when a router sets the metric for a downed link to infinity. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. It describes when a router sets the metric for a downed link to infinity. It is information received from a router that can't be sent back to the originating router. It sends back the protocol received from a router as a poison pill, which stops the regular updates. It prevents regular update messages from reinstating a route that has just come up. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which is true regarding EIGRP successor routes?1. A successor route is used by EIGRP to forward traffic to a destination.2. Successor routes are saved in the topology table to be used if the primary route fails.3. Successor routes are flagged as "active" in the routing table.4. A successor route may be backed up by a feasible successor route.5. Successor routes are stored in the neighbor table following the discovery process. 3, 4 and 5 1 and 3 1 and 4 2 and 3 3, 4 and 5 1 and 3 1 and 4 2 and 3 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Unmodulated signal coming from a transmitter is know as None of these Primary signal Baseband signal Carrier signal None of these Primary signal Baseband signal Carrier signal ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Telecommunications networks come in a wide range of speed and capacity capabilities. Select the best fit for answer: None of these Extranets Switching alternating Inter organizational networks Bandwidth alternatives None of these Extranets Switching alternating Inter organizational networks Bandwidth alternatives ANSWER DOWNLOAD EXAMIANS APP
Computer Networking With which network type will OSPF establish router adjacencies but not perform the DR/BDR election process? Broadcast multi-access Non-broadcast multi-access IS-IS Backbone area 0 Point-to-point Broadcast multi-access Non-broadcast multi-access IS-IS Backbone area 0 Point-to-point ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You are working with a network that has the network ID 192.168.10.0 and require nine subsets for your company and the maximum number of hosts. What subnet mask should you use? 255.255.255.192 255.255.255.240 255.255.255.248 255.255.255.252 255.255.255.224 255.255.255.192 255.255.255.240 255.255.255.248 255.255.255.252 255.255.255.224 ANSWER DOWNLOAD EXAMIANS APP