Two of the protocols that can be carried in the Protocol
field of an IP packet are?
A. TCP
B. UDP
C. FTP
D. TFTP
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A & B
The following are the fields in an IP segment,
their length, and their definitions:
VERS (Version number - 16 bits)
HLEN (Number of 32-bit words in the header - 4 bits)
Type of Server (How the datagram should be handled - 32 bits)
Total Length (Total length of header and data - 32 bits)
Identification (Provide fragmentation of datagrams to allow
different MTUs in the internet - 4 bits)
Flags (Provide fragmentation of datagrams to allow different
MTUs in the internet - 4 bits)
Frag Offset (Provide fragmentation of datagrams to allow
different MTUs in the internet - 6 bits)
TTL (Time-To-Live - 6 bits)
Protocol (Upperlayer protocol sending the datagram - 16 bits)
Header Checksum )Integrity check on the header - 16 bits)
Source IP Address (32 bits)
Destination IP Address (32 bits)
IP Options (network testing, debugging, security and others
- 4 bits)
Data (4 bits).
| Is This Answer Correct ? | 7 Yes | 1 No |
what is route aggregation
in stead of 0.0.0.0 wild card mask what u can write after ip?
Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering F. broadcast packet hop count learning/forward/filtering
let threr are three router 1 is cionected to two and two is conected to three that is 1----2----3 now we can ping 2 from 3 and 1 to two but we are not able to ping 1 to 3 let router 1 is local and rest of two are remote what should be urs troubleshoot steps
Identify the mode reflected by the following prompt 'Router'? A.) Setup B.) RXBoot C.) Boot mode D.) Privileged exec mode
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
Which of the following is True regarding passwords on a Cisco router? A. All passwords can be encrypted B. All passwords can be entered using the set-up dialogue C. A password can be set before a user can enter the privileged mode D. A password can be set for individual lines E. TACACS or Radius password authentication can be used.
What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+P
Suppose there are 3 pc's pc1 pc2 and pc3 all are connected with each other pc 1 is able to ping pc2 and pc3 but pc2 and pc 3 not able to ping pc 1 then what is an issue troubleshoot it?
How can we configure Inter-VLAN in Layer 3 Switch? Remember one thing without Router.
Define bandwidth?
Identify 1 characteristic of RARP? A.) IP to MAC address translation B.) Connectionless delivery of packets C.) Can be used to initiate remote O/S load sequence D.) Generates error and control messages