Novell's implementation of RIP updates routing tables every ____ seconds. A. 60 B. 90 C. 10 D. 30
1 11468Which type of Ethernet framing is used for TCP/IP and AppleTalk? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP
1 6657Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
6 31200What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.
2 7500Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of 255.255.255.0 ? A.) ip address 12.23.4.5 255.255.255.0 B.) ip address 12.23.4.5 /24 C.) ip address 12.23.4.5 mask 255.255.255.0 D.) ip address 12.23.4.5 mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address
3 7243Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash
4 12263Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface
2 4253At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance
12 43014When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised
8 10662You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode
10 14524If i connect two routers through ethernet cable and serial cable then which has high speed and which is better among two?
10 11625Post New Wipro CCNA Interview Questions
I have a program with an Array of 5000 occurences which is being passed from 5 sub levels to the front end screen. Thess 5 programs using each 5*2 = 10 different arrays with size as 5000. This is causing the transaction to utilize more storage consupmtion. I am looking to reduce the storage consumption. As part of that initially i thought Dynamic array may solve my problem. After viewing the comments given i see its same as normal array. IS there any other way we can resolve this issue?
What is the difference between a bug, a defect and an error?
What are data modelling techniques?
What is the use of extent in informix?
What is a font in ms word?
What are the most common linux unix gui interfaces?
where you wand to go in your weekend
Name the sql joins that are available in informix.
Describe node.js event loop and event driver architecture?
how many layers of tcp/ip protocol combined of? : Sql server database administration
Why do you want to join the banking sector?
how to upgrade database tables in the later versions of an application?
Why do not we prefer non conventional sources of energy to conventional sources?
What is dotx?
Explain some of the exclusive features which are present in vb?