Hi friend , This is Harekrushna . I have been tried for
netsim keygen but i could not download this crack file .if
it download then showes the writer protect error. PLEASE
sugest me what isthe soluation. or any other software
avalibe for pratics the network .
Answers were Sorted based on User's Feedback
Answer / dharmendra kumar soni
hey,
give me your maild gmail or any................
Is This Answer Correct ? | 1 Yes | 2 No |
Which command displays all the commands in the history buffer? A. CTRL H B. show buffer C. show history D. show history buffer
Define network?
what is the binary value of loop back address
My question is how windows pc will act as a router? Jitendra understand this question? I again want to ask you is it possibele for windows pc to act like a router
What parameter is used with statically assigned routers to tell packets which interface to use to reach a distant network? A.) Mask B.) Subnet C.) Default gateway D.) Interface
The following selections show the command prompt and the configuration of the IP network mask. Which two are correct? A. Router#term IP netmask-format { bitcount | decimal | hexadecimal } B. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } C. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal } D. Router#ip netmask-format { bitcount | decimal | hexadecimal }
Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
What are segments?
What is the routing metric used by IGRP? A.) MTU, delay, bandwidth, reliability, and loading B.) Count to infinity C.) TTL D.) Hop count
What are the 3 ways routers learn paths to destination networks? A.) Dynamic B.) Static C.) Routing tables D.) Default
Which of the following is True regarding passwords on a Cisco router? A. All passwords can be encrypted B. All passwords can be entered using the set-up dialogue C. A password can be set before a user can enter the privileged mode D. A password can be set for individual lines E. TACACS or Radius password authentication can be used.
CCNA question and answer only for networking.