Novell's implementation of RIP updates routing tables every ____ seconds. A. 60 B. 90 C. 10 D. 30
1 25462Which type of Ethernet framing is used for TCP/IP and AppleTalk? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP
1 7574Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
6 33729What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.
2 8774Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of 255.255.255.0 ? A.) ip address 12.23.4.5 255.255.255.0 B.) ip address 12.23.4.5 /24 C.) ip address 12.23.4.5 mask 255.255.255.0 D.) ip address 12.23.4.5 mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address
3 8567Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash
4 14108Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface
2 5389At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance
12 47470When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised
8 13830You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode
10 17918Post New Wipro Interview Questions
Why do you want to work for Meijer?
What is an inner join?
What kind of animals live under ground?
Can we use ddl statements in stored procedure sql server?
A. State in your own words what Little’s Law means. Describe an example that you have observed where little’s Law applies. B. “You don’t inspect quality into a product; you have to build it in.” Discuss the implications of this statement
What is RDD Lineage?
Explain what are some methods of reducing dimensionality?
There are 5 fields and 1000 records in a file. Unload it into an array. Write the syntax for declaration and how will you unload it.
You want to insert a new item in a binary search tree. How would you do it?
What are the parts of a sql statement?
What can I do at a wi-fi?
7. Give me an example of a time when you have tried to accomplish something, and failed
Explain the aims of teaching mathematics at secondary level.
what are variables(business objects) in ibm bpm?
Tell me what is laravel eloquent?