"snap" is used by the Cisco IOS for which encapsulation
Answer / guest
Answer:: A,B &C
Novell's IPX and Cisco's IOS name their
protocols differently. Cisco uses sap for Ethernet_802.2,
Token-Ring, and Novell's FDDI_802.2. Cisco uses snap for
Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses
arpa for Ethernet_II and, finally the default is
Novell-ether for Novell's Ethernet_802.3.
|Is This Answer Correct ?||2 Yes||0 No|
Identify the type of routing protocol that exchanges entire routing tables at regular intervals? A.) Link state B.) Interior gateway protocols C.) Appletalk routing D.) Distance vector
What is the purpose of Split Horizon? A.) It prevents the regular update messages from reinstating a route that has gone down B.) Information received on an interface cannot be sent back out the same interface C.) Informs all neighbor routers that two routes exist D.) Tells the router the destination is unreachable
What is the standard ISDN term for a native ISDN telephone? A.) ET B.) TE1 C.) TE2 D.) LE E.) TA
What is subnetting and supernetting and its uses?
which utility should use to test whether TCP/IP has been initialized on a system.friends plz post the answer with explaination..
Which command will start the process for a Cisco IOS file image upgrade? A.) download B.) copy tftp flash C.) copy flash tftp D.) download flash E.) network
Choose the following that are benefits to segmenting with router: A.) Flow Control B.) Manageability C.) Multiple Active Paths D.) Explicit packet lifetime control
How many ways are there to implement VPN architecture?
Identify the 3 guidelines for routers in the same autonomous system? A.) Must be configured for IGRP or RIP B.) Interconnected C.) Assigned the same autonomous system number D.) Configured for the same routing protocol E.) Must be same model of router
MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.) Network C.) Datalink D.) Transport E.) Application F.) Presentation
Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion