Identify the following command to configure a secret password to
'cisco'?
A.) Router(config)#enable password cisco secret
B.) Router(config)#enable secret cisco
C.) Router(config)#enable secret password cisco
D.) Router(config)#set secret = cisco
What is 100BaseFX?
Which two statements about IP RIP are true? (Choose two) A. It limits hop counts to 31 B. It is a link state routing protocol C. It uses autonomous system numbers D. It is capable of load sharing over multiple paths E. It uses bandwidth as the metric for path selection F. It broadcasts updates every 30 seconds by default
hi jitendra i am sunil here and i am an engineering student from delhi i have lots of interest in computer network.i was in serch of doing communication through MAC adressess.can u help me?
You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet
What does -1 signify in an extended IPX access list? A. permit this host B. deny this host C. permit only this subnet D. any host or any network
Hi, gys i am Hasnain alamI want to get certification how do it ? please sugges me.
heyyy frnds can please me that which institue is good for me in hardware and networking because im coming frm Dubai
Which ipsec rule is used for the olympia branch and what does it define? (Choose two)
What is the standard ISDN term for a non-native analog telephone? A.) TE1 B.) TA C.) LE D.) TE2 E.) ET
What is the link state routing protocol in the TCP/IP protocol stack? A. IP B. IS-IS C. NLSP D. OSPF E. RIP version 2
Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP
Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination