As the system administrator, you type "ppp authentication
chap pap
secret". Which authentication method is used first in
setting up a session?
A. secret
B. PAP
C. CHAP
D. PPP/SLIP
Identify 3 characteristics of IP RIP? A.) Distance vector B.) Administrative distance is 120 C.) Periodic updates every 60 seconds D.) Uses a composite metric E.) Can load balance
Identify 3 Fast Ethernet technologies? A.) 100 Base FastEther B.) 100 Base FX C.) 100 Base T4 D.) 100 Base TX
A router blocks ___________ Broadcasts Unicasts All packets Nothing
Identify the 2 commands that will display the status and information about interface E0 only? A.) show interface ethernet E0 B.) show interface E0 C.) show E0 D.) show int E0 E.) show interface
Each department has its own file server and the company has an enterprise server that is shared by all departments. What does a network administrator use to provide a secure separation between the management and sales departments? A. a bridge between management and sales B. routers to provide the most secure segmentation C. a hub to provide ease of management and a satisfactory alternative for network security D. an Ethernet switch to maintain secure separationthrough programming the access lists for each port of the switch
Identify the following command to configure a secret password to 'cisco'? A.) Router(config)#enable password cisco secret B.) Router(config)#enable secret cisco C.) Router(config)#enable secret password cisco D.) Router(config)#set secret = cisco
Can you explain how L2F data tunneling process works?
You want to set the console password to ralph. What would be the first command you need to execute from global configuration mode? A.) line console 0 B.) enable password ralph C.) login password ralph D.) set password= ralph E.) password ralph F.) login Ralph
Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A. trace B. ping C. telnet D. bootp
What is mac address size of ipv6?
How many collision domains are in switch?
What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.