Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the difference between the communication and transmission?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

What IP command would you use to test the entire IP stack? A.) Stack-test B.) Arp C.) Telnet D.) Ping E.) Trace

2 Answers  


ccna syallabus and what is the mean by troubble shooting

2 Answers   IBM,


Frame relay technology works on which layer of osi model?

0 Answers  


what hapeen we we configure default root on the router which is conected by isp supoese there are two router r1 is conected throug isp and and by s0 r1 is conexted to r2 if we apply degault root on r1 what will happen

3 Answers  


Explain the difference between collision domain and broadcast domain.

0 Answers  


Which of the following is True regarding passwords on a Cisco router? A. All passwords can be encrypted B. All passwords can be entered using the set-up dialogue C. A password can be set before a user can enter the privileged mode D. A password can be set for individual lines E. TACACS or Radius password authentication can be used.

1 Answers   TATA,


Which reserve port number talent use?

0 Answers  


which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?

0 Answers  


How many ports are present in a router?

0 Answers  


Scenario: You created 2 access-lists for controlling telnet about a year ago, and bound one of them to Serial 0. You can't remember which access-list you used. Which command lets you see all access-lists on Serial 0 for telnet? A.) show access-list B.) show ip int s0 C.) show access-list telnet D.) show telnet access-list E.) show access-list s0 F.) show int s0

2 Answers  


Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it

1 Answers  


Hi Jitendera, I continuously read your answers which is more knowlegable than books... Q.I am facing some problems in subnetting.can you plzz explain the subnetting process.. will be remain thankful

4 Answers  


Categories