What is a key use of a device hardware address?
A. to obtain a vendor code / serial number from the user
B. to transmit a frame from one Interface to another Interface
C. to transmit a packet from one local device to another
local device
D. to transmit data from one local device to a remote device
across the internet
E. to contain logical information about the device to use
for end-to-end transmission
b Which protocol for PPP LCP (Link Control Protocol) performs a challenge handshake? A. CHAP B. PAP C. UDP D. IPX
What are the two primary operating modes for frame switching? A. Full Duplex B. Half-Duplex C. CSMA/CD D. Cut-through E. Fragmentation F. Store and Forward G. User mode H. Privileged mode
Explain on which interface we always apply access-list?
can any budy send the steps for enabling snmp on cisco switches(L2).
Which of the following are solutions to the problems encountered with Distance-Vector routing? A.) Defining a Maximum B.) Poison Reverse C.) Triggered Updates D.) Shortest path first algorithm. E.) Split Horizon
Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged the are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination
X.25 is characterized by layer 2 identifiers, and what else? A.) Virtual Lan's B.) Session Layer C.) Transport Layer D.) Routing Updates E.) PVC's
Which EXEC command displays system hardwarde configuration information software version and the names and sources of configuration files and boot images on a router? A. show boot B. show flash C. show config D. show version
If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method is this? A.) Store-and-drop B.) Latency C.) Store-and-forward D.) Cut-through
what is the binary value of loop back address
What requirements should a VPN fulfill?
What is de-encapsulation?