What command would you use to find out the names of Novell
servers on a network?
A. show ipx servers
B. show ipx hosts
C. show ipx sap
D. show ipx nodes.
What would be the proper wildcard mask to permit all odd numbered hosts on the 10.48.0.0/12 network? access-list 1 permit 10.48.0.0 0.15.255.255 access-list 1 permit 10.48.0.1 0.15.255.254 access-list 1 permit 10.48.0.0 0.15.255.1 access-list 1 permit 10.48.0.0 0.0.0.254 access-list 1 permit 10.48.0.0 0.0.0.255
what is leased line and if any issue occur what will u do thai is trouble shootin occurs let leased line is down
What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.
Identify 2 reasons for disabling CDP? A.) If the router is not configured for RIP B.) Save bandwidth by eliminating overhead C.) If the router is configured for Appletalk D.) When connected to a non-Cisco router
How does a switch use store and forward? A.) By using a Class I repeater in a collision domain B.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface C.) By using broadcast addresses as source addresses D.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets
What is BGP Synchronization rules?? Can any one explain..???
what is the distance betwwen link stae routing protocl and distance vector who have the best convergence toplogy eigrp conatain 3 table name them what the toplogy table contain
Which of the following are valid Cisco encapsulation type names? A.) arpa = IPX Ethernet B.) novell-ether = IPX Ethernet_802.3 C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring D.) novell-fddi = IPX Fddi_Raw E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring F.) hdlc = HDLC on serial interfaces
Which OSI layer defines end to end communication, segmentation and re-assembly? A.) Network B.) Transport C.) Physical D.) Application E.) Data-Link F.) Presentation
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
What ISDN protocol specifies concepts, terminology, and services? A.) Q B.) S C.) I D.) E
Which of the following use PVCs at layer 2? A.) X.25 B.) HDLC C.) Frame relay D.) ISDN