Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the advantages of lan switching?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

What is the difference between hub, switch, and router?

0 Answers  


friends i have some problem in the acess list plz help me out. purbi sinha. 1 what is the diffrence b/w inbound and out bound access list 2 what is main diffrence betwwen standred acesslist and extended access list 3 where should i keep stnadred access list and exatended access list i mean at which interface and why? 4 why wild card masking is used 5 what is switch febric in switching plz help me out i am litle bit confuse

1 Answers  


Which configuration mode and command combination sets the bandwidth metric of a Frame Relay connection? A. router(config)# clock rate 56 B. router(config)# bandwidth 56 C. router(config)# bandwidth 56000 D. router(config)# clock rate 56000

2 Answers  


What is trigger rip and from which ios version it starts?

0 Answers  


What is hold down time formula of ospf?

0 Answers  


Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version

1 Answers  


Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP

3 Answers  


You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet

2 Answers  


What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.

2 Answers  


How can an Ethernet switch improve network performance? Choose three

2 Answers  


Why Operating System Have only 65,535 port Numbers

5 Answers  


What is the difference between private ip and public ip?

0 Answers  


Categories