Given an IPX network with redundant paths, what command will
configure load balancing?
A.) ipx load-balance
B.) ip maximum-paths 2
C.) ipx maximum-paths 2
D.) ipx load-share
Answers were Sorted based on User's Feedback
How can you add the 192.168.100.0/30 network to EIGRP without involving the 192.168.100.4/30 network as well?
Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not at the same time
heyyy frnds can please me that which institue is good for me in hardware and networking because im coming frm Dubai
what does the clock rate do?
Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.
what is difference between designated router and backup designated router and explain feature of both router.
Which layer hides details of network dependent information from the higher layers by providing transparent data transfer? A.) Transport B.) Physical C.) Data Link D.) Session E.) Application F.) Network
You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255
What is the Function of Layer3 Switch?
What is the size of ipv6?