The Physical layer works with which of the following: A.) Segments B.) Datagrams C.) Packets D.) Bits E.) Frames
BITS,
3 7185Which of the following is an example of the Network Layer? A.) LLC B.) SQL C.) Token Ring D.) IPX E.) SPX
1 5151When setting up a frame-relay network between a Cisco router and a non-Cisco router, what encapsulation type should you use? A.) SAP B.) CISCO C.) IANA D.) Apollo E.) IETF F.) Q933A
2 4707A user device that connects to a DCE must be which of the following? A.) DTE B.) CPE C.) Demarc D.) DCE E.) CO
1 2983What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
1 2965Given the global configuration commands: 'banner motd #' 'Hello #' When would the message be displayed? A.) The message of the day banner shows up before login. B.) The message of the day banner shows up during logoff. C.) These commands are not the right syntax for MOTD. D.) Message of the day banners are displayed upon entering global config mode. E.) Message of the day banners are not possible. F.) The message of the day would be, 'Hello #'
1 4433Which ISDN specification deals with call Setup and Teardown? A.) Q-Series B.) J-Series C.) I- Series D.) C- Series E.) F-Series
1 4368All equipment located at the customers site is called: A.) CPE B.) CO C.) DCE D.) Demarc E.) DTE
1 3361Which layer allows multiple Ethernet devices to uniquely identify one another on the Datalink layer? A.) Transport B.) Session C.) Network D.) Datalink - MAC Sublayer E.) Datalink - LLC Sublayer
3 5117Which of the following are examples of ICMP? A.) Traceroute B.) Web Browsing C.) Ping D.) Telnet E.) Destination Unreachable message from a router F.) Inverse Tunnels
1 3698Novell NetWare has an Ethernet frame type called Ethernet_SNAP. What is the matching Cisco command line keyword for this encapsulation method? A.) arpa B.) sap C.) snap D.) gns E.) dix F.) novell-ether
1 3604Given the Novell IPX address 1aceb0b.0000.0c12.3456 which part is the network portion of the address? A.) 0000 B.) 1 C.) 3456 D.) 1ace E.) 0000.0c12.3456 F.) 1aceb0b
2 3744In version 11.2 of the IOS, a Cisco router configured for frame-relay can automatically detect the LMI type. What is this known as? A.) Psychic B.) ESP C.) Inverse ARP D.) Hello E.) Reverse ARP F.) Autosense
2 4857What type of Ethernet operation allows only one entity to transmit at a time? For example, if someone else is transmitting, they must wait. A.) Full-Duplex B.) Dual-Duplex C.) Half-Duplex D.) Latex E.) Quarter-Duplex F.) Suplex
1 3231Which of the following are examples of the Application Layer? A.) LLC B.) Token Ring C.) Spreadsheet D.) TCP E.) IP F.) Word Processor
1 3475
Explain how many types of ips?
How does Hold-downs work?
What is a digital certificate?
Which defined peer ip address an local subnet belong to crete?
What does the meaning of
Explain how many types of router?
What is the purpose of data link layer?
Brielfly explain the conversion steps in data encapsulation
What is the terminal emulation?
What are the netbios and netbeui?
Utilizing RIP, what is the limit when it comes to number of hops?
Explain the matric of eigrp protocol?
What are the different types of passwords used in securing a CISCO router?
What is the key advantage of using switches?
What is STP and what is the difference between PVST and RSTP