What is the Cisco name for the encapsulation type used on a serial interface? A. HDLC B. SDLC C. SAP D. SNAP
3 28872Identify the OSI layer which is responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP
2 13038Which layer is responsible for coordinating communication between systems? A.) Application B.) Network C.) Session D.) Transport E.) Physical F.) Data Link
2 13772Identify the keystroke used to terminate the setup mode? A.) Ctrl-K B.) Crtl-C C.) Ctrl-Z D.) Crtl-End
1 8774Identify the command to configure the router to boot from an IOS located on a TFTP server? A.) boot system tftp IOS.exe 172.16.5.1 B.) boot system tftp 172.16.5.1 IOS.exe C.) boot system flash tftp 172.16.5.1 D.) boot system IOS.exe 172.16.5.1
2 7479Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
1 4702Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any eq 21 log B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21 log C.) router(config)# acess-list 101 permit any any 172.16.30.0 D.) router(config)# access-list 101 permit ip host 172.16.30.0 any eq 21 log
2 6778What is the connection oriented protocol in the TCP/IP protocol stack? A. IP B. UDP C. TCP D. DNS E. OSPF
5 10787What must you do to test connectivity on a dial on demand routing (DDR) link? A. increase the idle Import parameter B. send interesting traffic across the link C. reboot one of the integrated services digital network (ISDN) routers D. reset the DDR integrated services digital network (ISDN) router statistics to zero
1 7354What is the link state routing protocol in the TCP/IP protocol stack? A. IP B. IS-IS C. NLSP D. OSPF E. RIP version 2
2 5937Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config
8 11957Which memory component on a Cisco router contains the dynamic system configuration? ROM NVRAM Flash RAM/DRAM
17 40715Post New HCL CCNA Interview Questions
What happens on checkpoint?
Explain acbgen process?
Can you discuss the role of immunosuppressive therapy in kidney transplantation and its impact on patient outcomes?
A company wants to transmit data over the telephone, but it is concerned that its phones may be tapped. All of its data is transmitted as four-digit integers. It has asked you to write a program that will encrypt its data so that the data may be transmitted more securely. Your script should read a four digit integer entered by the user in a prompt dialog and encrypt it as follows: Replace each digit by (the sum of that digit plus 7) modulus 10. Then swap the first digit with the third, and swap the second digit with the fourth. Then output XHTML text that displays the encrypted integer.
What is negative tag?
Mention the ways in which parameterized can be invoked. Give an example of each.
What is a footer used for?
Explain hard disk and what is its purpose? : .NET Architecture
what matters more to you- money or success?
What is pure oop?
WHAT KIND OF LIGHTENING PROTECTION SCHEMS CAN BE ADOPTED FOR THE FLAT ROOF OF BIG DIMENSION.
What is means by call function in python?
What tools can be used to assure a consistent style in node.js?
What are the drawbacks of Apache Spark?
Can I run c program in turbo c++?