As the system administrator, you enter the following commands at
the command prompt:
ipx routing
access-list 800 permit 2b 4d
int e0
ipx network 4d
ipx access-group 800 out
int e1
ipx network 2b
int e2
ipx network 3c
What did these command accomplish?
A. Traffic from network 4c destined for network 4d will be
forwarded out
Ethernet0.
B. Traffic from network 3c destined for network 4d will be
forwarded out
Ethernet0.
C. Traffic from network 2b destined for network 4d will be
forwarded out
Ethernet0.
D. Traffic from network 4d destined for network 2d will be
forwarded out
Ethernet0.
Answer / guest
Answer: C
Traffic from network 2b destined for network 4d will be
forwarded out
Ethernet0. The other interfaces E1 and E2 are not subject to
the access
list since they lack the access group statement to link them
to access
list 800.
| Is This Answer Correct ? | 1 Yes | 0 No |
What does the "IPX maximum-paths 2" command accomplish? A. It enables load sharing on 2 paths if the paths are equal metric paths. B. It sets up routing to go to network 2. C. It is the default for Cisco IPX load sharing. D. It enables load sharing on 2 paths if the paths are unequal metric paths.
Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not a the same time
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
can anybody send sample question on CCNA Exam.pls send to my email ca6thi@gmail.com
Explain the matric of eigrp protocol?
What causes a triggered update to reset the router hold-down timer?
What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.
Utilizing RIP, what is the limit when it comes to number of hops?
Identify the purpose of the following command 'ip route 192.168.100.0 255.255.255.0 10.1.0.1' A.) Enabling a dynamic routing protocol B.) Creating a static route to the 10.1.0.0 network C.) Teaches the router about the distant network 192.168.100.0 and how it can be reached via 10.1.0.1 D.) Assigining the IP address 192.168.100.0 to an interface
Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation
Can you explain the difference between trusted and untrusted networks?
Which address or number is used to pass the data to the correct application? MAC Number IP address Port Number Segment Number