Cisco Certifications (2321)
Microsoft Certifications (171)
Sun Certifications (45)
CISA Certification (744)
Oracle Certifications (64)
ISTQB Certification (109)
Certifications AllOther (295) What field tells the Internet layer how to handle an IP packet? A. Type of Service B. Identification C. Flags D. Frag Offset
1 9907Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? A. Identification B. Flags C. Frag Offset D. Type of Service E. Total Length
1 6988Which processes does TCP, but not UDP, use? A. Windowing B. Acknowledgements C. Source Port D. Destination Port
2 21053What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
1 6370What is the function of DDR on Cisco routers? A. DDR is dial--on-demand routing. It provides a continuous LAN only connection. B. DDR is dial-on-demand routing. It provides routing for high volume traffic. C. DDR is dial--on-demand routing. It provides a continuous WAN connection. D. DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic.
2 8203What are the two types of access lists that can be configured on a Cisco router? A. Standard B. Extended C. Filtering D. Packet
2 8193When using access lists, what does a Cisco router check first? A. To see if the packet is routable or bridgeable B. The destination address C. The source address D. The packet contents
1 5327How many access lists are allowed per interface? A. One per port, per protocol B. Two per port, per protocol C. Unlimited D. Router interface +1 per port.
6 29302What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.
1 8608What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.
1 6623Access lists are numbered. Which of the following ranges could be used for an IP access list? A. 600 - 699 B. 100 - 199 C. 1 - 99 D. 800 - 899 E. 1000 - 1099
1 4572Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do? A. It tells the router to check the corresponding bit value. B. It tells the router to ignore the corresponding bit value. C. It tells the router to check its alternate routing list. D. It tells the router to use its primary routing list.
2 6109You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255
1 11550In order to limit the quantity of numbers that a system administrator has to enter, Cisco can use which abbreviation to indicate 0.0.0.0? A. host B. any C. all D. include
1 4431What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.
1 11870
What is the difference between csma/cd and csma/ca?
What are the different types of the password used in securing a cisco router?
Can you explain encapsulating, carrier and passenger protocol?
HI Guys...... Good day ahead How many sub domains can be added in exchange server means in a domain
Which company mange ip's?
My sister is a british citizen naturalized, at present she is pregnant and she wanted to deliver her baby here in the philippines.. My question is, is her baby will be automatically a british citizen too? eventhough her baby will be born in her originated country, philippines.
What is difference between igp and eigrp?
can someone send me which is the best sas training institute in chennai?
Which protocols are link states?
Which 2 protocols are in wan technology?
salary package for sap fico fresher (zero experinece)
What is subnetting and why it is use?
Which type for communication switch do?
Explain the difference between tftp and ftp application layer protocols?
how to get iso certificate and which is the best for steel wire product and bathroom accessories , and how many percent central sales tax on it , please tell me as soon as possible