Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initialize routing tables C.) Synchronize sequence numbers between hosts D.) Connection tear down process
1 4266Identify 2 PPP characteristics? A.) Is proprietary to Cisco B.) Supports authentication C.) Support compression D.) Run on a multi-access network
3 7489Which statement is true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not a the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth
1 12324Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address
3 8037Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Data link
2 6151Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector
1 5136Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connections D.) Path selection E.) MAC address examination F.) Network monitoring
2 8383Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically connected network(s) B.) Configure the classful address, no subnets C.) Enable CDP so neighbors can be detected D.) Configure all networks in Area0
1 4664Identify 3 characteristics of an IP address? A.) Contains a network portion and a host portion B.) 32 bits long C.) Unique to each network D.) Part of the default Cisco configuration E.) Referred to as the hardware address
6 33999Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default
1 6117Which OSI layer performs code conversion, code formatting and encryption? A.) Physical B.) Data-Link C.) Application D.) Transport E.) Presentation F.) Network
1 12462Identify the 3 methods routers learn paths to destinations? A.) Dynamic routing B.) None of the above, configured by default C.) Default routes D.) Administrative distance E.) Static routes
1 4308Identify the purpose of the following command 'ip route 192.168.100.0 255.255.255.0 10.1.0.1' A.) Enabling a dynamic routing protocol B.) Creating a static route to the 10.1.0.0 network C.) Teaches the router about the distant network 192.168.100.0 and how it can be reached via 10.1.0.1 D.) Assigning the IP address 192.168.100.0 to an interface
1 5862Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191 D.) 1 - 191
4 9234What does a Standard IP Access-list use as test criteria? A.) IP source address B.) IP source and destination address, protocol numbers and port numbers C.) IPX source and destination address D.) Source MAC address
2 7850
Define mac address?
Which protocol comes under hybrid dynamic type?
Explain the difference between simple authentication and md5?
Tell me how much hold down time of eigrep protocol?
How many types of data?
What’s the simplest way to remotely configure a router?
What is the working of router?
What is the network subnet?
What is the difference between unicast, multicast, broadcast, and anycast?
Define the logical link control?
What is meant arp and rarp?
What is the Difference Between Windows 2003 And Windows 2008 Server?
What is the difference between an igp and an egp?
What do you understand by poe (power over ethernet)?
What is the subnet? Why is it used?