Which 2 protocols are in wan technology?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Which two steps are required to confound and apply standard access lists on an interface? (Choose two) A. define an access list number and its parameters B. enable an interface to become part of the access list group C. define the number of access lists to be supported on an interface D. copy the access list definition to each interface that will support it

2 Answers  


Which router command allows you to determine if an IP access list is enabled on a particular interface? A. Router# show ip interface B. Router> show access-list C. Router# show ip access-list D. Router> show interface ip access-list E. Route 1 P.O. box 198

2 Answers  


You want to set the console password to ralph. What would be the first command you need to execute from global configuration mode? A.) line console 0 B.) enable password ralph C.) login password ralph D.) set password= ralph E.) password ralph F.) login Ralph

1 Answers  


Which reserve port no http use?

0 Answers  


What is difference between IPv4 & IPv6??

7 Answers   Hathway,






Identify 3 characteristics of ISDN? A.) Transports voice and data B.) Transports voice only C.) Support both BRI and PRI D.) Runs over existing phone lines E.) Same as X.25

1 Answers  


Why Clock rate command is not configured on ethernet interface of a router?

6 Answers  


Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session

1 Answers   Rooman,


Explain what are the ranges of private ips?

0 Answers  


Identify the number range for IPX SAP filters? A.) 900 - 999 B.) 1000 - 1099 C.) 800 -899 D.) 100 - 199

1 Answers  


Which of the following will show an extended access list 150? A.) sh access-list 150 B.) sh ip int C.) sh ip access-list D.) sh access-list 150 extended

2 Answers  


Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery

1 Answers  


Categories