Identify the correct pair of Novell Ethernet encapsulation and Cisco terminology? A.) Ethernet II, Snap B.) Ethernet 802.3, Novell-Ether C.) Ethernet SNAP, Arpa D.) Ethernet 802.2, Snap
1 5133Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
1 3868Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) ROM D.) Console E.) Trace
2 10096A traffic light is an example of what type of mechanism? A.) Collision detection B.) Flow control C.) Sequence numbering D.) Network management
1 4739Windowing is a type of : A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control
1 4642Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter
1 3784Identify the 3 guidelines for routers in the same autonomous system? A.) Must be configured for RIP B.) Interconnected C.) Assigned the same autonomous system number D.) Configured for the same routing protocol E.) Must be same model of router
1 4077Identify the hardware component used to store buffers, tables, running-configuration etc? A.) NVRAM B.) ROM C.) RAM D.) Flash
4 13502Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connnection-less oriented D.) Incorporates no handshaking
2 7289Identify the IPX standard access-list number range? A.) 600 - 699 B.) 1000 - 1099 C.) 1 - 99 D.) 100 - 199 E.) 800 - 899
1 4750Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application
3 12454Identify the 2 methods to modify the routers boot sequence? A.) Setup program B.) Boot system commands C.) RXBoot D.) Config-register
1 4504Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router
3 10937Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process
1 3865Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward
2 4929
What is cam?
What are the ranges for the private ips?
What are the different memories used in a CISCO router?
Define class full protocol?
Why is UDP lease favored when compared to TCP?
Can you explain tunneling?
Explain what is 5-4-3 rule?
What are the protocol data units (pdu) in ccna?
Which cable called v.35?
What is the size of an ip address?
What is the Difference Between Windows 2003 And Windows 2008 Server?
How many hope count rip or rip2 can send updates?
What metric does rip use? How is the metric used to indicate an unreachable network?
What is ‘round-trip time’?
Hi Jitendera, Wat do u do..?? I mean r u working anywhere???? Basically where r u from??? If u don't hv any problem, u can say..?? Or else mail me mr.shahin07@gmail.com