What are the three sources of signal degradation on a data link?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

What is the mau?

0 Answers  


Which command allows a user to see previous commands? A.) show command B.) CTRL-P C.) show history D.) CTRL-U E.) Up Arrow F.) SHIFT-CTRL-6

1 Answers  


what is the difference b/w pap and chap,and give comand to configure pap cahp on two router r1 and r2,

1 Answers  


Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? A. ICMP B. UDP C. TCP D. TFTP E. FTP

2 Answers   TCP,


Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do? A. It tells the router to check the corresponding bit value. B. It tells the router to ignore the corresponding bit value. C. It tells the router to check its alternate routing list. D. It tells the router to use its primary routing list.

2 Answers  






thnx jitender...its me shridh...m working for SG ltd..the situation iz like ths -at a specific time in our company the internet connectivity goes off...v hav two networks in our company...but out of it only one link goes down for 5-10 sec...a fastethernet port becomes down for few sec and automatically becomes Up... Is this occures becoz of Power?? If yes thn y the 2nd network is not affected?? plz tel me jitender how to resolve ths problem? as u sd loop in switch is the primary cause of ths....i wanna know how to resolve it...thnx for ur replys jitender sinha.

2 Answers  


What is proxy-ARP and how it is used and configured

1 Answers  


Identify the command to display the hardware platform information? A.) show all B.) show platform C.) display hardware D.) show version

1 Answers  


IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address

2 Answers  


What is the usage of service password encryption?

0 Answers  


Identify the protocol to test connectivity without configuring any layer 3 protocols? A.) TCP B.) Ping C.) IP D.) CDP E.) Telnet

1 Answers  


Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0

2 Answers  


Categories