Cisco's implementation of ISDN BRI has multi protocol support, SNMP MIB support, and what other features? A.) Call waiting B.) Compression C.) ADSL D.) 1.544 Mbps E.) Call screening F.) Negative 'G' support
1 3299The Network layer works with which of the following: A.) Globules B.) Bits C.) Packets D.) Segments E.) Frames
3 4749An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.
1 2780Which is not a common problem with Distance-Vector routing? A.) Slow convergence. B.) Complex configuration. C.) Routing loops. D.) Periodic updates can slow convergence. E.) Counting to infinity.
1 4141Which routing protocols uses connection-oriented routing updates? A.) IGRP B.) UDP C.) RIP D.) IP E.) BGP
2 4995At which layer of the OSI Reference Model do bridges operate? A.) Physcial B.) Session C.) Datalink D.) Transport E.) Network
2 6602Where is the point between the customers site and the phone carrier that responsibility changes? A.) CO B.) Demarc C.) DCE D.) DTE E.) CPE
1 3153Novell NetWare has an Ethernet frame type called Ethernet_802.2. What is the matching Cisco command line keyword for this encapsulation method? A.) gns B.) arpa C.) snap D.) sap E.) novell-ether F.) dix
1 4819Which of the following is an example of the Physical Layer? A.) TCP B.) ARP C.) IP D.) FDDI E.) LLC F.) Fast Ethernet
2 3934Which of the following is true regarding standard ISDN BRI service? A.) ISDN BRI B channels are typically 64K. B.) ISDN BRI can handle only voice. C.) ISDN BRI can handle only data. D.) ISDN BRI has 2B and 1D channels. E.) ISDN BRI D channels are 16K. F.) ISDN BRI can handle voice and data.
2 5854In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.
2 7743Which of the following are examples of the Network Layer? A.) Token Ring B.) LLC C.) SQL D.) IP E.) TCP F.) IPX
3 4460Which type of switching reads just the address portion of the frame and then immediately starts forwarding it? A.) Cut-Through B.) Store-and-Forward C.) Tabling D.) Routing E.) Inverse ARP F.) Fast Forward
1 3051Which feature of PPP (Point to Point Protocol) allows the router to bind multiple channels together, to form a single logical channel? A.) multi-link ppp B.) multi-channel ppp C.) can't be done D.) omni-ppp E.) plp
1 4093Which of the following are solutions to the problems encountered with Distance-Vector routing? A.) Defining a Maximum B.) Poison Reverse C.) Triggered Updates D.) Shortest path first algorithm. E.) Split Horizon
1 4151
Differentiate User Mode from Privileged Mode?
How can you assign a vlan to a switch port?
When we use extended access-list?
What are the conversion steps of data encapsulation?
After how long keep alive messages exchange in eigrp?
What is the difference between private ip and public ip?
How many ways to access router?
In which ios version 182 people can access router through telenet?
What is raid in ccna?
How do we do encryption and authentication in L2TP?
Why is vlan used?
I simulate ten routers r1 to r10 straightly. I want I can ping from the loop of r1 to loop of r10, but I want I cant ping r1 and r10 from inside routers.?
Which ipsec rule is used for the olympia branch and what does it define?
What do you understand by poe (power over ethernet)?
When written