As the system administrator, you type "ppp authentication
chap pap
secret". Which authentication method is used first in
setting up a session?
A. secret
B. PAP
C. CHAP
D. PPP/SLIP
Which layer is responsible for identifying and establishing the availability of the intended communication partner? A.) Application B.) Presentation C.) Transport D.) Session E.) Network
Which type of switching is considered to be 'wire speed?' A.) Cut-Through B.) Multiplexed C.) Inverted D.) Layer 4 E.) Store and Forward F.) Layer 3
What is the size of ipv6?
Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding
How we can find ASBR Router, we have no authentication to enter router?
What 2 commands verify end to end communications? A.) Trace B.) debug ip session C.) Ping D.) Route
Identify the command to copy a configuration file from a TFTP server to a routers active configuration? A.) Router# copy running-config tftp B.) Router# copy tftp running-config C.) Router# copy tftp 172.16.0.1 running-config D.) Router(config)# copy tftp running-config
what hapeen we we configure default root on the router which is conected by isp supoese there are two router r1 is conected throug isp and and by s0 r1 is conexted to r2 if we apply degault root on r1 what will happen
Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) Token Ring E.) IP
Mention what is the difference between the switch, hub, and router?
what is ip address and what is the difference between the ip address and mac address why we are not using mac address instead of ip address
Identify the X.25 addressing standard? A.) X.121 B.) X.25a C.) ITU-1 D.) Q933a