What type of transmission bus topology support?
No Answer is Posted For this Question
Be the First to Post Answer
tell me our traditional ip routing is what A--conectless b----conection orented c-----pacekt switching d------ckt switching slect any two this is the question which i forgot to incoprate next-questions
Identify the IPX standard access-list number range? A.) 600 - 699 B.) 1000 - 1099 C.) 1 - 99 D.) 100 - 199 E.) 800 - 899
What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging
Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables
Hi friend , This is Harekrushna . I have been tried for netsim keygen but i could not download this crack file .if it download then showes the writer protect error. PLEASE sugest me what isthe soluation. or any other software avalibe for pratics the network .
Tell me how much hold down time of eigrep protocol?
The Cisco Catalyst 5000 switch supports full duplex. How would you enable it on the second port of the card in slot 1? A.) router(config-if)# duplex full B.) router(config)# duplex full C.) router(config-if)# set port duplex D.) router(config)#port duplex = full E.) router(config-if)# set port 1/2 full
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process
Why OSI layers having 7 layers instead of one layer.