Novell's implementation of RIP updates routing tables every ____ seconds. A. 60 B. 90 C. 10 D. 301 6875
Which type of Ethernet framing is used for TCP/IP and AppleTalk? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP1 5538
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical6 26144
What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.2 5929
Which command would configure Interface E0 with an IP address of 22.214.171.124 using a Subnet mask of 255.255.255.0 ? A.) ip address 126.96.36.199 255.255.255.0 B.) ip address 188.8.131.52 /24 C.) ip address 184.108.40.206 mask 255.255.255.0 D.) ip address 220.127.116.11 mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address3 5601
Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash4 9773
What is the most common layer 2 device? A. Hub B. Router C. Switch D. Repeater7 9225
Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface2 3077
At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance12 35959
When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised8 7526
You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode10 10300
Why we choose the router rather then L-3 Switch8 5971
If i connect two routers through ethernet cable and serial cable then which has high speed and which is better among two?10 8176
what is the difference between osi and tcp ?8 6022
Tell me CCNA Course + Dump Q/A in chennai?2 3235
Explain how cassandra delete data?
What is the difference between PIC 9.99 and 9v99 in COBOL?
What is microsoft push notification service?
why do you want to work with tavant technologies?
why is it important for HR management to transform from primarily admininistrative and operetional to becoming a more stratgeic contributor?
What is the difference between remove() and removeChild()?
How to recover from sql injection? : sql server security
Why we use virtual companies?
How can i copy program (parameter) from mm440 (V.F.D.) by using BOP?
Can you define cognos decision stream?
What is email marketing? What are the types of email marketing?
Can intelligence server integrate with my existing data structure?
What are the Formatting and Printing Strings available in PHP?
What is meant by 2-tier architecture in client server environment?
What is best practice to refer dynamic custom messages in visualforce with multi-language support ?