Which technologies listed below help prevent network loops in a switched (bridged) environment? A.) Store-and-Forward B.) IEEE 802.1d C.) Diikjstra Algorithm D.) Cut-Through E.) Spanning Tree Protocol F.) Routing
1 4155Which OSI Reference Layer controls end-to-end (host to host) communication? A.) Transport B.) Physical C.) Datalink D.) Network E.) Session
1 4628What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.
1 7377We know that TCP provides connection oriented services, what else does it provide? A.) FECN & BECN B.) Path discovery. C.) Flow control and error checking. D.) Name resolution. E.) File manipulation.
1 4836With distance vector routing protocols, it is never useful to send the same routing update packet back out the same interface that it was learned. This concept is called what? A.) Holddown timers B.) Poison Reverse C.) Count to infinity D.) Split Horizon E.) Link State
2 4970Which of the following are ways to provide login access to a router? A.) HTTP B.) Console C.) Telnet D.) Aux Port E.) SNMP F.) LLC
3 15966What two types of PPP data compression are available using Cisco IOS? A.) Predictor B.) DoubleSpace C.) Stacker D.) PAP E.) ZIP F.) CHAP
2 7599In regards to the OSI seven-layer model, at which layer is EBCDIC and ASCII? A.) Presentation B.) Application C.) Transport D.) Session E.) Datalink F.) Network
1 3773Which of the following are examples of the Transport Layer? A.) SQL B.) UDP C.) IP D.) LLC E.) ARP
1 3894Given the global configuration command 'banner motd #7 Hello #', what do the '#' symbols represent? A.) Escape sequence to exit the menu. B.) Nothing, just part of the banner. C.) Tic Tac Toe Macro. D.) Delimiting Character E.) Message border character. F.) Number of times message to be displayed.
1 3935There is a process in Frame-Relay where LMI resolves an IP address from a DLCI number. What is this called? A.) arp B.) inverse arp C.) rarp D.) automap E.) reverse arp F.) arp
2 5563When setting up a WAN network, everything outside of the Demarc is not owned by the customer. Which of the following are not owned by the customer? A.) The T1 line. B.) LAN C.) The Router D.) DTE E.) PC's F.) CO
1 3999You want to segment a network. The network is running SNA and Netbios. Which device should NOT be used to segment the network? A.) A store and forward switch. B.) A router. C.) A Catalyst 5000. D.) A cut-through switch. E.) A bridge.
1 4104Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link. A.) RFC 1661 B.) High Level Datalink Protocol (HDLC) C.) Challenge Handshake Authentication Protocol (CHAP) D.) SS7 E.) Link Control Protocol (LCP)
2 4821Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) Token Ring E.) FDDI F.) TCP
2 5137
Which layer are called upper layer?
Name the command we use for ping in ipv6?
What is HDLC?
What is the ieee standard for wireless networking?
Explain the difference between named and extended acl?
Which defined peer ip address an local subnet belong to crete?
Utilizing RIP, what is the limit when it comes to number of hops?
Explain the difference between half-duplex and full-duplex?
What is the maximum value of administrative you can use?
On which bas ospf take decision?
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
What are the advantages of lan switching?
How much internal and external ad of eigrp protocol?
What is the difference between ‘bit rate’ and ‘baud rate’?
What s the formula for metric of ospf?