You have OSPF traffic flooding your network
via one of your router interfaces. Write the access
list line that will deny all ospf traffic. Don't
worry about the other lines of the access list.
What 3 sources can configuration commands be placed into RAM? A.) HP Openview B.) Console C.) Vterminal D.) TFTP server E.) NVRAM
8. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges in your network C. When you install routers in your network D. When you use Switches configured with multiple VLANS
What are the 3 ways routers learn paths to destination networks? A.) Dynamic B.) Static C.) Routing tables D.) Default
Identify the command to disable CDP on an interface? A.) Router(config-if)# no cdp enable B.) Router(config-if)# no cdp run C.) Router# no cdp enable D.) Router(config-if)# no cdp
Which of the following will show an extended access list 150? A.) sh access-list 150 B.) sh ip int C.) sh ip access-list D.) sh access-list 150 extended
Which of the following is a layer 2 device? A.) Switch B.) Bridge C.) Repeater D.) Hub
Select the compression protocols for PPP? A. Stac B. Predictor C. Quality D. Magic Number
What is HDLC?
Which layer is responsible for putting 1s and 0s into a logical group? A.) Session B.) Application C.) Transport D.) Data Link E.) Physical F.) Network
Can you explain how L2F data tunneling process works?
In regards to TCP/IP, which class of address allows for the fewest valid Internet hosts? A.) D B.) E C.) Classes are not used in TCP/IP. D.) B E.) C F.) A
The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.) Presentation C.) Network D.) Datalink E.) Session F.) Transport