Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Novell NetWare has an Ethernet frame type called
Ethernet_II. What

is the matching Cisco command line keyword for this
encapsulation method?

A.) dix

B.) sap

C.) arpa

D.) gns

E.) snap

F.) novell-ether



Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command..

Answer / guest

Answer: C

Novell 802.2 = sap (contains 802.2 LLC headers)

Novell 802.3 = novell-ether (NetWare proprietary)

Ethernet_II = arpa (the Internet standard)

snap = snap (field type set to 'AA')

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More CCNA Interview Questions

Which layer is responsible for determining if sufficient resources for the intended communication exists? A.) Application B.) Network C.) Session D.) Presentation E.) Transport

3 Answers  


How are internetworks created?

0 Answers  


What are hold-downs used for? A.) To prevent regular update messages from reinstating a route that has come back up B.) Information received on an interface cannot be sent back out the same interface C.) To prevent regular update messages from reinstating a route that has gone down D.) To hold the routing table from being sent to another router

1 Answers  


What is proxy-ARP and how it is used and configured

1 Answers  


Explain dhcp scope?

0 Answers  


Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.

1 Answers  


Explain what is the default behavior of access-list?

0 Answers  


Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group

1 Answers  


Which Standard IP Access list commands will deny only the source address 1.1.1.1? A.) access-list 9 deny host 1.1.1.1 B.) access-list 9 deny 1.1.1.1 255.255.255.0 C.) access-list 9 deny 1.1.1.1 0.0.0.0 D.) access-list 9 deny 1.1.1.1 0.255.255.255 E.) access-list 9 deny 1.1.1.1 255.255.255.255

5 Answers  


What are the different ways authentication mechanism in VPN?

0 Answers   CCIE,


IGRP supports a feature that allows traffic to be distributed among up to 6 (4 default) paths to provide greater overall throughput and reliability. What is this called? A. unequal-cost load balancing B. equal-cost load balancing C. proportionate load balancing D. low cost load balancing

1 Answers  


What must be true for two routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D.) Configured for PPP

1 Answers  


Categories