Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...



Certifications Interview Questions
Questions Answers Views Company eMail

What is the distance limitation for 100BaseT? A. 305.955 ft B. 7283.46 inches C. 184 Meters D. 185 Kilometers

3 7086

What is the distance limitation for 100BaseT? A. 607 ft B. 25 Meters C. 1,000 ft D. 185 Meters

1 5115

A network is vow congested currently all the devices are connected through a hub. Which would best decrease congestion on this network? A. add a second hub B. replace the hub with a router C. replace the hub with a switch D. replace the hub with a repeater

1 4803

Which command should you use to confound a router so that it can become a TFTP server host for a router system image that is run in a Flash? A. copy flash tftp B. config tftp server C. write, network -router name- D. tftp-server system -file name- E. setup server tftp -system name-

1 6358

Which command loads a new version of the Cisco IOS into a router? A. copy flash ftp B. copy ftp flash C. copy flash tftp D. copy tftp flash

2 10515

In the setup dialog, what do the square brackets indicate? A. current or default spores B. hard coded values that cannot be modified C. values entered by the administrator but not saved D. values that must be written to PAVRAM before becoming enabled

1 5782

What not a name of an ISP? A. MSN B. Comcast C. Verizon D. McDonalds

2 4398

How does inter- VLAN communication take place? A. It takes place through any Cisco router B. It takes place through a Cisco router that can run ISL C. It takes place through a router but this disables all the router a security and filtering functionality for the VLANS D. For nonroutable protocals (e.g. NetBeui) the router provides communications between VLAN domains E. Inter-VLAN communication is not possible because each VLAN is a separate broadcast domain

3 17950

Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol

2 11713

Which two statements about IP RIP are true? (Choose two) A. It limits hop counts to 31 B. It is a link state routing protocol C. It uses autonomous system numbers D. It is capable of load sharing over multiple paths E. It uses bandwidth as the metric for path selection F. It broadcasts updates every 30 seconds by default

1 8492

What are two purposes for segmenting a network with a bridge? (Choose two) A. to reduce collisions B. to increase collisions C. to add collision domains D. to reduce collision domains E. to have more broadcast domains

Ecobank, RNP,

3 19066

What is the protocol and what is the purpose of the following address? 238 255 255 255 A. IPX a SAP broadcast B. IP a multicast group C. IP a reserved address D. IP a directed broadcast E. IPX a flooded broadcast

3 6543

Which of the following is true? A. The default is to send debug output to the console screen. B. To view debug output from a telnet session, the "terminal monitor" command must be used C. If the "logging buffered" command is used, the debug output would be sent to RAM and can be viewed with the "show log" command D. If the "no console loggin" command were configured, output would besent to a telnet session E. All of the above F. None of the above G. A, B, and C. H. A, C, D, and E.

2 4732

What is the maximum number of subnets that can be assigned to networks when using the address 172.16.0.0 with a subnet mask of 255.255.240.0? (Assume older version UNIX workstations are in use.) A. 16 B. 32 C. 30 D. 14 E. It is an invalid subnet mask for the Network.

2 8738

How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A. 4 B. 30 C. 60 D. 62 E. 112 F. 124

7 11096


Un-Answered Questions { Certifications }

Explain what is overlaod?

1048


I want to do QTP Mercury Certification, give me an idea and the where can i register for that?

2921


How many types of ospf configuration?

1244


Mention what is bootp?

1131


Sun Certificatio details.

2567


Can you explain the broader steps of how L2F establishes the tunnel?

2042


Can you explain VPN tunneled packet in detail?

2193


What is meant arp and rarp?

1127


What is the fees of dot net? in various institutes? Frzs plz reply...

2068


In which protocol you manually enable route summarization?

1276


Hub in star topology or bus topology?

1129


from where can i avail a certificate course of EPBX so that in helps me improve my resume as front desk executive

1933


How many ways are there to implement VPN architecture?

3675


Why subnetting is used?

1220


what is the thing that is created adjacent to the transparent table created on the database? a)fields b)data element c)structure 4)table type ques2)what operation you cannot perform on internal table? a)append b)sort c)insert d)modify e)delete

1934