You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet
1 5359What is the difference between TCP and UDP? A.) TCP is connection-oriented; UDP uses acknowledgements only B.) TCP is connection-oriented; UDP is connectionless C.) Both TCP and UDP are connection-oriented, but only TCP uses windowing D.) TCP and UDP both have sequencing, but UDP is connectionless
4 9470What does the 'S' mean when looking at the routing table? A.) Statically connected B.) Directly connected C.) Dynamically attached D.) Shutdown route
2 17233Why would you use static routing instead of dynamic routing? A.) When you want automatic updates of the routing tables B.) All the time C.) When you have very few routes and want to conserve bandwidth D.) When you have a gateway of last resort
1 9905On Cisco catalyst 5000 how would you set the second port on the controller in the first slot to full duplex? A.) Set port duplex 1/1 full B.) Set port duplex 1/2 full C.) Set port duplex 0/1 full D.) Set port duplex 0/2 full
2 5871What does the acronym ARP stand for? A.) Address Resolution Phase B.) ARP Resolution Protocol C.) Address Resolution Protocol D.) Address Recall Protocol
2 8795What is the default encapsulation of Netware 3.12? A.) Ethernet_II B.) 802.5 C.) 802.2 D.) 802.3
1 5979Regarding frame relay, which of the following statements are true? A.) You must use ANSI encapsulation if connecting to non-Cisco equipment B.) You must use IETF encapsulation if connecting to non-Cisco equipment C.) You must use Q.933a encapsulation if connecting to non-Cisco equipment D.) You must use Cisco encapsulation if connecting to non-Cisco equipment
2 9290What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards
1 6368Which layer is responsible for determining if sufficient resources for the intended communication exists? A.) Application B.) Network C.) Session D.) Presentation E.) Transport
1 4324What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
1 4603Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery
1 4136Which of the following provide correct information about a protocol at the transport layer of the OSI model? A.) UDP - Provides Connectionless datagrams service B.) TCP - Provides Connection Oriented Services C.) SMTP - Provides Mail Exchange D.) IP - Route determination E.) TCP - Provides Flow Control and Error Checking F.) FTP - Transfers of Files
2 5335Which protocol works at the Internet layer and is responsible for making routing decisions? A.) UDP B.) IP C.) TCP D.) ARP
3 9187Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and tear down of virtual circuits? A.) Session B.) Network C.) Physical D.) Transport E.) Application F.) Presentation
2 7650
hi friend i am sending some interview question which is asked from me at volvo hope this will help you of all 1 what is mpls al question is posted by jitendera kumar sinha
If bandwidth will increase what will happen?
What is the default behavior of access-list?
Can you explain encapsulating, carrier and passenger protocol?
Which decision called socket base?
How arp brings mac address for switch?
What metric does rip use? How is the metric used to indicate an unreachable network?
Name the command we give on privilege mode for coming back to user execution mode?
Briefly explain the conversion steps in data encapsulation.
What is a switch and why we are using switches?
Explain the difference between half-duplex and full-duplex?
2500 Value in which type of access list?
Explain the types of ethernet?
Which command we give for see routing table?
What are the different types of VPN?