Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Novell NetWare has an Ethernet frame type called Ethernet_802.2.

What is the matching Cisco command line keyword for this
encapsulation

method?

A.) gns

B.) arpa

C.) snap

D.) sap

E.) novell-ether

F.) dix



Novell NetWare has an Ethernet frame type called Ethernet_802.2. What is the matching Cisco comma..

Answer / guest

Answer: D

Novell 802.2 = sap (contains 802.2 LLC headers)

Novell 802.3 = novell-ether (NetWare proprietary)

Ethernet_II = arpa (the Internet standard)

snap = snap (field type set to 'AA')

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which of the following is an example of the Network Layer? A.) TCP B.) IP C.) SQL D.) Token Ring E.) LLC

2 Answers  


What does the trace response !H mean? * A: Network unreachable * B: Not forwarded due to ACL restriction * C: Protocol unreachable * D: Port could not be reached

2 Answers  


Which addresses are INCORRECTLY paired with their class? A. 240 - 255, Class D B. 240 - 255, Class E C. 224 - 239, Class D D. 224 - 239, Class E

2 Answers  


How can an Ethernet switch improve network performance? Choose three

2 Answers  


How do we do encryption and authentication in L2F?

0 Answers   CCIE,


Name the command we use for ping in ipv6?

0 Answers  


what are the different asymmetric algorithms?

0 Answers   CCIE,


What is the difference between the switch, hub, and router?

0 Answers  


What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.

1 Answers  


There are 2 types of PPP authentication supported by the Cisco IOS. What are they? A.) PAP B.) PREDICTOR C.) MD5 D.) CHAP E.) STACKER F.) MSCHAP

4 Answers  


Which command we give for see routing table?

0 Answers  


How does a switch use store and forward? A.) By using a Class I repeater in a collision domain B.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface C.) By using broadcast addresses as source addresses D.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets

2 Answers  


Categories