Which of these is the Private key?
A. Bear
B. Cave
C. Indian
D. Cowboy
Identify the command to configure a description on an interface? A.) Router> description Finance department B.) Router(config)# description Finance department C.) Router(config-if)# description Finance department D.) Router# description Finance department
In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.
what is the purpose of multicast packets?
What information is provided by the local management interface (LMI)? A.) LMI encapsulation type B.) The current DLCI values C.) The status of virtual circuits D.) The global or local significance of the DLCI values
What is the regional Telco office called, where the customers local loop terminates? A.) Demarc B.) DTE C.) DCE D.) CO E.) CPE
Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in
Which command would show all Ethernet interfaces with IPX configured on them? A.) show interface ipx ethernet B.) show ipx interface C.) show ipx interface ethernet D.) show ipx E.) show version F.) show run
What is STP and what is the difference between PVST and RSTP
What is the maximum number of subnets that can be assigned to networks when using the address 172.16.0.0 with a subnet mask of 255.255.240.0? (Assume older version UNIX workstations are in use.) A. 16 B. 32 C. 30 D. 14 E. It is an invalid subnet mask for the Network.
What is ping used for?
How many subnets can be gained by subnetting 172.17.32.0/23 into a /27 mask, and how many usable host addresses will there be per subnet?
3. What does a bridge use to segment a network? A. IP Addresses B. Broadcasts C. Application data D. Media Access Control addresses