Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
1 3917Which device listed below provides clocking for the line? A.) DCE B.) CPE C.) CO D.) DTE E.) Demarc
2 6886Which OSI Reference Layer controls application to application communication? A.) Datalink B.) Network C.) Transport D.) Session E.) Physical
3 6781The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.
2 8702When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.
1 4924Which of the following would not be displayed by the command ?sho cdp neighbor detail?? A.) The incoming/outgoing interface. B.) The hardware platform. C.) One address per protocol. D.) Amount of Flash Memory Available E.) The routers hostname. F.) The subnet mask, if IP is configured.
1 4385Which of the following are characteristics of UDP? A.) UDP is connection oriented. B.) UDP is used with TFTP. C.) UDP is unreliable. D.) UDP is connectionless. E.) UDP is at the transport layer. F.) UDP uses no acknowledgements.
6 18445What is a characteristic of Store and Forward switches? A.) They work at wire speed. B.) They are the same as Cut-Through switching in 'prune' mode. C.) They forward based on transport layer info. D.) They forward the frame before it is completely read. E.) They increase latency.
2 7203The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.) Presentation C.) Network D.) Datalink E.) Session F.) Transport
2 4620In regards to TCP/IP, which class of address allows for the fewest valid Internet hosts? A.) D B.) E C.) Classes are not used in TCP/IP. D.) B E.) C F.) A
1 4468For IPX, what is the DEFAULT Cisco Encapsulation on an Ethernet interface? A.) novell-ether B.) gns C.) snap D.) arpa E.) sap F.) dix
1 4070Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether
1 4082There are 2 types of PPP authentication supported by the Cisco IOS. What are they? A.) PAP B.) PREDICTOR C.) MD5 D.) CHAP E.) STACKER F.) MSCHAP
4 8943Which of the following are examples of the Transport Layer? A.) Token Ring B.) UDP C.) TCP D.) IP E.) SQL F.) LLC
2 5433Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
1 4972
Explain what is formula of hold down time of eigrp protocol?
What is the role of the LLC sublayer?
How are straight and crossable cables different from each other?
Differentiate between broadcast domain and collision domain
I simulate ten routers r1 to r10 straightly. I want I can ping from the loop of r1 to loop of r10, but I want I cant ping r1 and r10 from inside routers.?
When we use standard access-list?
Define osi?
Explain the difference between routable and non- routable protocols?
Which 2 protocols are in wan technology?
What is the main advantage of using switches?
Tell me which protocol comes under hybrid dynamic type?
What are the different IPX access lists?
What is meant arp and rarp?
Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?
Your company has been assigned the IP address of 201.222.5.0 and require having 20 subnets. As the company’s network administrator, find the following: a) the subnet mask (2 marks) b) the number of useable subnets (2 marks) c) the subnetwork address for the 4th subnet (2 marks) d) the first usable IP address for the 4th subnet (2 marks) e) the last usable IP address for the 4th subnet (2 marks) f) the broadcast address for the 4th subnet. (2 marks)