To monitor ipx traffic on a network, what command would you use?
A. debug ipx transaction
B. show ipx traffic
C. show ipx events
D. display ipx traffic
Answers were Sorted based on User's Feedback
What is wide-mouth frog?
hello friend i have answerd more time of your question or doute.now i am seeing towards you for help,plz send the soln before monedya the problem is i have three router r1 and r2 and r3 they are conested in that maneer thai is r1---r2---r3---server | | server bothe server have diffrent ip now i have to implemnt access list on the r3 router in such a way that user from r1 can access only one server while user from r2 can access whole servre i ahve done it but both user of r1 and r2 uses all server i need help please help me this time? i have repalsced my firwall by r3 router so bacicaly i have to implement it on my firewall but you tell me on cisco router please help
What utility can you use to see the path a packet takes through an internetwork? A.) Route B.) SNMP C.) Trace D.) Ping
What command would show the version of the IOS that you are running? A.) show nvram B.) show version C.) show startup-config D.) show ios E.) ver -a F.) show ram
What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6
Identify the command to configure the router to boot from an alternate IOS located in flash? A.) boot system flash IOS.exe B.) boot system tftp IOS.exe 172.16.5.1 C.) boot system alternate IOS.exe D.) boot system rom IOS.exe
Hi, I cannot download anything on my office pc. only because of that i want online practice sites. anyway thanks for providing me website
Which term describes the process in which frames from one network system are placed inside the frames of another network system? A. bridging B. tunnelling C. data link control D. generic routing E. packet switching
What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable
Name the vtp modes?
Explain the difference between simple authentication and md5?
Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic