Which two of the following are valid ways to have multiple
encapsulation
types on a single interface?
A.) This is not possible
B.) subinterfaces
C.) additional physical interfaces
D.) secondary addresses
What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops
Identify the purpose of the following command 'ip route 192.168.100.0 255.255.255.0 10.1.0.1' A.) Enabling a dynamic routing protocol B.) Creating a static route to the 10.1.0.0 network C.) Teaches the router about the distant network 192.168.100.0 and how it can be reached via 10.1.0.1 D.) Assigining the IP address 192.168.100.0 to an interface
What command will display all connected OSPFv2 routers?
On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this channel? A.) 64 Kbps B.) 1.544 Mbps C.) 128 Kbps D.) 2.048 Mbps E.) 16 Kbps
What is the logical link control?
WHAT IS RIP PROTOCAL ?
Where is the point between the customers site and the phone carrier that responsibility changes? A.) CO B.) Demarc C.) DCE D.) DTE E.) CPE
Identify the OSI layer responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP
hi shain i have got some virus who make the .exe file that is duplicate of original file on my server 2007 windows can u suggest me any anti virus help help please help
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
Which IP host address range is allowable given an IP address of 172.37.2.56 and 12 bits of subnetting A. 172.37.2.48 to 172.37.2.63 B. 172.37.2.48 to 172.37.2.62 C. 172.37.2.49 to 172.37.2.62 D. 172.37.2.49 to 172.37.2.63 E. 172.37.2.55 to 172.37.2.126
Identify the command to display all the valid commands at the given mode? A.) Help all B.) Help C.) All commands D.) ?