Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric
2 6451Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199
4 6816Identify 3 features of IGRP? A.) Composite metric B.) New horizon C.) Flash updates D.) 60 periodic updates E.) Poison reverse
1 4012Identify the correct pair of Novell Ethernet encapsulation and Cisco terminology? A.) Ethernet II, Snap B.) Ethernet 802.3, Novell-Ether C.) Ethernet SNAP, Arpa D.) Ethernet 802.2, Snap
1 5184Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
1 3619Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) Ping D.) Console E.) Trace
2 7982A traffic light is an example of what type of mechanism? A.) Collision detection B.) Flow control C.) Sequence numbering D.) Network management
1 6415Windowing is a type of? A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control
1 4975Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter
1 4240Identify the 3 guidelines for routers in the same autonomous system? A.) Must be configured for IGRP or RIP B.) Interconnected C.) Assigned the same autonomous system number D.) Configured for the same routing protocol E.) Must be same model of router
1 6705Identify the hardware component used to store buffers, tables, running-configuration etc? A.) NVRAM B.) ROM C.) RAM D.) Flash
1 4349Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connection-less oriented D.) Incorporates no handshaking
2 8193Identify the IPX standard access-list number range? A.) 600 - 699 B.) 1000 - 1099 C.) 1 - 99 D.) 100 - 199 E.) 800 - 899
1 5059
What is the maximum request timer?
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?
What is default time of hello packets in ospf?
Mention what BOOTP is?
What is the usage of service password encryption?
Value in which type of access list?
Explain the types of communication in ipv4?
How do you go to privileged mode? How do you switch back to user mode?
Your company has been assigned the IP address of 201.222.5.0 and require having 20 subnets. As the company’s network administrator, find the following: a) the subnet mask (2 marks) b) the number of useable subnets (2 marks) c) the subnetwork address for the 4th subnet (2 marks) d) the first usable IP address for the 4th subnet (2 marks) e) the last usable IP address for the 4th subnet (2 marks) f) the broadcast address for the 4th subnet. (2 marks)
Which mode called privilege mode?
What is the purpose of a data link?
How do you configure a cisco router for routing ipx?
What is default packet size of ipv6?
What are the steps of data encapsulation?