Identify the type of hardware required to connect a Token ring
network to an Ethernet network?
A.) Repeater
B.) TR-Enet
C.) Router
D.) Token Ring to Ethernet translation hub
Answer / guest
Answer: C
Routers are used to connect dissimilar networks with different
access-methods, like connecting Token Ring to Ethernet.
| Is This Answer Correct ? | 3 Yes | 1 No |
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.
Of the following switching types, which one has the highest latency? A.) Cut-through B.) None C.) Store-and-forward D.) Fragment Free
how we can creat VPN..??? how it can be configured on cisco switches..??? can we creat VPN on different networks..??? why we need to create VPN..??? kindly write complete activity of commands to configure a VPN on switch..??? me specially looking towards Jatendra and Shahin
hello, i got a job in a voip company.they said it is technical support---chat ,mail support.i am a btech with ccna.the salary is 3k for 3 months5k for next 3 and 7k from 7th month.is it a good job.i want to be a network eng.is tis path rt and if so wen should i switch to next level from tis job. Could u explain wot is NOC. please reply.really confused
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
Q: why are switch trunking modes ( dynamic auto , dynamic desirable )used in switch while trunking? if only negotiation is the factor it can be done with one mode as well ie dynamic desirable . but why we need dynamic auto. coz it dsnt negotiates ..at all please post answer asap thanks :
ip dhcp excluded-address 192.168.0.1 192.168.0.19 what is the use of that command can any one explain it
Define bandwidth?
What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP
Identify the command mode necessary to enter the extended ping command? A.) Router# B.) Router> C.) Router(config)# D.) Router(ext-ping)#
Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C.) Router> D.) Router(priv)#