Novell's implementation of RIP updates routing tables every ____ seconds. A. 60 B. 90 C. 10 D. 30
1 25386Which type of Ethernet framing is used for TCP/IP and AppleTalk? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP
1 7521Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
6 33582What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.
2 8702Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of 255.255.255.0 ? A.) ip address 12.23.4.5 255.255.255.0 B.) ip address 12.23.4.5 /24 C.) ip address 12.23.4.5 mask 255.255.255.0 D.) ip address 12.23.4.5 mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address
3 8457Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash
4 13955Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface
2 5312At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance
12 47096When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised
8 13552You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode
10 17671If i connect two routers through ethernet cable and serial cable then which has high speed and which is better among two?
10 14522Post New Wipro CCNA Interview Questions
Can I still use windows live mail?
When you fill in the values for selection, what are the options available in general?
What is medium term scheduling in operating system (os)?
Why should I use wordpress?
What do location update mean? Why do we need them?
What is an example of an application service provider?
You are working on a project that will upgrade the phone system in your customer service center. You have used bottom-up estimating techniques to assign costs to the project activities and have determined the cost baseline. Which of the following is true? A. You have completed the Cost Estimating process and now need to complete the Cost Budgeting process to determine the project's baseline. B. You have completed the Project Plan Development process and established a project baseline to measure future project performance against. C. You have completed the Cost Estimating process and now need to complete the Project Plan Development process to establish a project baseline to measure future project performance against. D. You have completed the Cost Budgeting process, and the cost baseline will be used to measure future project performance.
How does qtp identify objects in the application?
tell me what is the ? Is it necessary to use in html5
How can you override system ribbon button functionality?
What is an mrp type?
What is the difference between the operators '==' and '==='?
Which class is used by server applications to obtain a port and listen for client requests?
how an accountant can do budgetery controls of expenses?
If we want to return the character from a specific index which method is used?