Name the command we give on privilege mode for coming back to user execution mode?
No Answer is Posted For this Question
Be the First to Post Answer
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
Why we choose the router rather then L-3 Switch
8 Answers Network Solutions, Wipro,
What is an advantage of UDP? Low Overhead High Overhead Reliable Not reliable
Difference between routed and routing protocols not difference between protocol between those.
Which works router do?
What is 10baset ethernet lans?
What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6
IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address
Which layer allows multiple Ethernet devices to uniquely identify one another on the Datalink layer? A.) Transport B.) Session C.) Network D.) Datalink - MAC Sublayer E.) Datalink - LLC Sublayer
The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.) Presentation C.) Network D.) Datalink E.) Session F.) Transport
When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes
What is the standard ISDN term for a native ISDN modem? A.) ET B.) LE C.) TE2 D.) TE3 E.) TA