How can change k-value in EIGRP configuration.
Match the following devices with the correct description. A. Switch 1. Operates at the physical layer and extends the cable as if it is a single cable. B. Router 2. Operates at the physical layer and connects all connections into one device or concentrator. C. Repeater 3. Operates at the network layer and can filter both hardware and network addresses. D. Hub 4. Works at the Data-Link layer and transmits a digital signal only to the specific port where the destination MAC address is located.
SNMP agents are: A. Management devices B. NMS (Network Management Stations) C. network devices such as routers, switches, or hubs D. PDUs
Which two statements correctly identify considerations to take into account when deciding on campus QoS Design elements ?
when ever we apply show flash comand on the router it givesthat informatin router#show flash syatem file directory: file length name/status 1 8121000 c2500-js-L.112-18.bin what does it nean plz help i have read it from book but not bale to understand i am looking towards u for the help
Diagramming application information flow is important because: A. it helps identify heavy traffic paths B. it helps figure out why email gets from one place to another C. it can tell you when to purchase a new router D. it can tell you when to purchase a new switch
What would a TE2 device be used for in an ISDN connection? A. as a connection from an NT1 device to an NT2 device B. as a connection from a non-ISDN terminal through a TA to the ISDN network C. as a connection from four-wire subscriber wiring to the conventional two-wire local loop D. as a connection to the ISDN network through a four-wire, twisted-pair digital link
What are the three commonly used methods of flow control used for handling network congestion? A. Buffering B. Source-quench messages C. Error checking D. Windowing
It is not necessary to build an entire network to prove your network design. A. True B. False
What address is 12 hexadecimal, resides in the Data-Link layer, and is burned in the ROM by the manufacturer.
What are two ways to connect a PC to a LAN when using ATM (Asynchronous Transfer Mode)? A. ATM endpoint B. ATM LAPB C. ATM router D. ATM switch
How does the Spanning Tree Protocol (STP) prevent bridging loops? A. By not allowing any redundant paths within the network B. By calculating the metrics of each path C. By detecting and logically blocking redundant paths from the network D. By creating virtual LANS
Which two of the following describe ASN.1 (Abstract Syntax Notation One)? A. It is an abstract routing protocol that is not used very often. B. It is an OSI language for describing data types independent of particular computer structures and representation techniques. C. Consists of only one basic routing algorithm. D. Uses BER (Basic Encoding Rules).