Novell's implementation of RIP updates routing tables every ____ seconds. A. 60 B. 90 C. 10 D. 30
1 25331Which type of Ethernet framing is used for TCP/IP and AppleTalk? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP
1 7495Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
6 33534What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.
2 8676Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of 255.255.255.0 ? A.) ip address 12.23.4.5 255.255.255.0 B.) ip address 12.23.4.5 /24 C.) ip address 12.23.4.5 mask 255.255.255.0 D.) ip address 12.23.4.5 mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address
3 8431Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash
4 13906Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface
2 5297At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance
12 46970When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised
8 13466You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode
10 17598Post New Wipro Interview Questions
What are the difference phases of software development? Explain briefly?
Is there an easy way to delete an element from a php array?
How can we connect defect report from testlab&testplan tabs?
What are the different types of delegation?
How can you find out how long the system has been running?
What is gross refinery margin?Explain clearly
What are triggers? How many triggers you can have on a table? How to invoke a trigger on demand?
How could you check null and undefined in typescript?
Give an account on Virus de-envelopment ?
How to sort an array from smallest to largest java?
How to access js (javascript) file in jsf (javaserver faces) application?
Please send all the previous year question on SBI clerical post.My e-mail ID is raffiq1182@yahoo.com
Explain if the rule availability is set as no/draft mode?
What is mutable and immutable in swift?
What are the data integrator transforms?