Which protocol for PPP provides load balancing across
multiple links?
A. Multilink Protocol (MP)
B. Quality
C. Magic Number
D. Stacker
E. Predictor
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.
What is subnetting and why it is use?
When setting up a WAN network, everything outside of the Demarc is not owned by the customer. Which of the following are not owned by the customer? A.) The T1 line. B.) LAN C.) The Router D.) DTE E.) PC's F.) CO
Identify 3 characteristics of an IP address? A.) Contains a network portion and a host portion B.) 32 bits long C.) Unique to each network D.) Part of the default Cisco configuration E.) Referred to as the hardware address
Identify the command to configure the configuration-register? A.) Router# config-register 0x2102 B.) Router(config)# config-register 0x2102 C.) Router(config-reg)# 0x2102 D.) Router> config-register 0x2102
can we measure how much a host exact bandwidth using by a network cable which is communicating over the network? options: 1- via Router 2- Switch, 3- other device... if yes.. then how ( with every option)
In order to enable RIP, which two tasks need to be performed? (choose two) A. Specify the routing protocol B. Confound static RIP routes C. Specify directly connected subnets D. Specify directly connected networks
My question is how windows pc will act as a router? Jitendra understand this question? I again want to ask you is it possibele for windows pc to act like a router
Identify 3 characteristics of ISDN? A.) Transports voice and data B.) Transports voice only C.) Support both BRI and PRI D.) Runs over existing phone lines E.) Same as X.25
What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.
Can you describe the Authentication Header (AH) Protocol?
What is the update period for rip?