To monitor ipx traffic on a network, what command would you use?

A. debug ipx transaction

B. show ipx traffic

C. show ipx events

D. display ipx traffic




Answers were Sorted based on User's Feedback



To monitor ipx traffic on a network, what command would you use? A. debug ipx transaction B. s..

Answer / guest

Answer: B

Is This Answer Correct ?    8 Yes 3 No

To monitor ipx traffic on a network, what command would you use? A. debug ipx transaction B. s..

Answer / rajan

show ipx traffic

Is This Answer Correct ?    6 Yes 1 No

To monitor ipx traffic on a network, what command would you use? A. debug ipx transaction B. s..

Answer / carl roa

B. show ipx traffic

Is This Answer Correct ?    0 Yes 0 No



Post New Answer



More CCNA Interview Questions

Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport

1 Answers  


what is the default ad value of the interface directly coneted to router. as for exmaple ad value of ospf is 90 then from ehternet the network is conected whta is difault value of that directly conected interface. what is the defalt ad value of bgp whta is access llist and how many type of access list what is vlan what is vpn how e congigure the router what is mpls these are the question skrd to me at tcs i have replyed all ecxept the first one

1 Answers   TCS,


Which information must a router know in order to perform proper and pungent routing? A. destination application of an incoming packet B. number of other packets in a single flow of data C. destination network address of an incoming packet D. number of routers that also know a path to the destination

1 Answers  


I am just getting into this,I want to jump ahead a do the packet tracers in discovery working at a small to medium business or ISP but I am trying to get the last lab putting it all together. Does anyone have anything for this. I know it is ahead of me but I would like to get this so I can look at the beginning and understand it more

2 Answers  


What are two purposes for segmenting a network with a bridge? (Choose two) A. to reduce collisions B. to increase collisions C. to add collision domains D. to reduce collision domains E. to have more broadcast domains

3 Answers   Ecobank, RNP,






Identify the following command to configure a secret password to 'cisco'? A.) Router(config)#enable password cisco secret B.) Router(config)#enable secret cisco C.) Router(config)#enable secret password cisco D.) Router(config)#set secret = cisco

1 Answers  


Write an access list line which will deny node 20.0.2.1 to anywhere on your network using DNS via UDP. Don't worry about the other access list lines.

2 Answers  


Which service uses telephone control messages and signals between the transfer points along the way to the called destination? A. Signaling System 7 (SS7) B. Time-division Multiplexing (TDM) C. X.25 D. Frame relay

1 Answers  


Company XYZ has an employee that works out of the home. The employee runs big client server applications and must quickly transfer large files. The company wants the best cost/benefit on this connection. What would be the most practical solution? A. an ISDN Basic Rate Interface (BRI) connection to the user at home B. a dedicated T1 connection to the user at home C. a dedicated Frame Relay connection to the user at home D. a standard 28.8 analog dialup connection to the user at home

2 Answers  


Why do we have a Layered Model? 1) It reduces complexity 2) Allows for a standardized interface 3) Facilitates modular engineering 4) Ensures interoperable technology 5) Accelerates evolution 6) Simplifies teaching and learning

1 Answers  


Identify 3 Fast Ethernet technologies? A.) 100 Base FastEther B.) 100 Base FX C.) 100 Base T4 D.) 100 Base TX

1 Answers  


What is the routing metric used by RIP? A.) Route poisoning B.) Split horizon C.) Hop Count D.) TTL

4 Answers   jetking, Tata Motors,






Categories