Identify the following components of the IPX address
2e.0000.0065.ed43
A.) Not a valid IPX address
B.) Network = 2e, Subnet = 0000, Node = 0065.ed43
C.) Network = 2e.0000, Node = 0065.ed43
D.) Network = 2e, Node = 0000.0065.ed43
What does the IPX maximum-path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)
What are the different IPX access lists?
What is the command to manually enter a static route? A.) IP route network B.) IP route C.) IP route < destination network> D.) IP route
Which of the following are characteristics of UDP? A.) UDP is connection oriented. B.) UDP is used with TFTP. C.) UDP is unreliable. D.) UDP is connectionless. E.) UDP is at the transport layer. F.) UDP uses no acknowledgements.
Which of the following is a layer 2 device? A.) Switch B.) Bridge C.) Repeater D.) Hub
Which OSI layer performs code conversion, code formatting and encryption? A.) Physical B.) Data-Link C.) Application D.) Transport E.) Presentation F.) Network
Can anyone explain the STP Security features. Just like BPDU guard, Root Guard. Hi JITENDERA, i m specially looking for u?????
Which of the following provide connection-oriented transport to upper layer protocols? A.) SPX B.) RIP C.) NLSP D.) NCP
As a system administrator, you need to provide your routers with a Domain Name System (DNS) server. How many DNS servers can you specify with one command? A. 6 B. 1 C. 2 D. 4
Can you explain IKE (Internet Key Exchange)?
what is a routing ?what is the use of routing?
8 Answers Google, IBM, Pacific, Tata Technologies,
What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops