What command displays detail information about the OSPF interfaces, including
the authentication method?
What port does rip use?
What does the 'S' mean when looking at the routing table? A.) Statically connected B.) Directly connected C.) Dynamically attached D.) Shutdown route
Sequence and acknowledgement numbers are used for? A.) Layer transitioning B.) Flow control C.) Port number addressing D.) Reliability
Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash
Which is true regarding half duplex Ethernet operation? A.) Half Duplex ethernet technology provides a transmit circuit connection wired directly to the receiver circuit at the other end B.) Half duplex transmission between stations is achieved by using point to multipoint Ethernet and Fast Ethernet C.) With Half Duplex transmission logically circuits feed into a single cable creating a situation similar to a one way bridge D.) Half Duplex transmission between stations is achieved using Point to Point Ethernet & Fast Ethernet
Suppose we have some switch in network and we are running RSTP how much convergence time will be there if one link down
Which protocol switch use for filling its mac-table?
I want to configure a serial interface on a 7500 with a VIP card. What global config command would give me access to a serial interface on a 7500? A.) int 1/0/0 B.) int s 1/0/0 C.) int s 1/1 D.) int s0.1 E.) int s1
from last ten days i watched that no any new questions are placed in ccna catogarey.so plz place the questions it is very use full to beginers like us
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
What are the conversion steps of data encapsulation?
Mention what are the ranges for the private ips?