Identify the effect of Ctrl-Z?
A.) Exits back to privileged exec mode
B.) Disconnect from the router
C.) Abort the ping operation
D.) Exits privileged exec mode
If you are in IOS user mode, which command do you use to enter the privileged mode? A. Set B. Enable C. Configure D. Privileges
What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6
Identify the administrative distance and appropriate routing protocol? A.) RIP = 255, IGRP = 100 B.) RIP = 100, IGRP = 120 C.) RIP = 1, IGRP = 0 D.) RIP = 120, IGRP = 100
Can you explain how L2F data tunneling process works?
How do you disable advanced editing? A.) terminal editing B.) terminal no editing C.) disable editing D.) no terminal editing
Can you explain the difference between trusted and untrusted networks?
How the STP determinw that which Port should be Root Port, which port should be Designeted Port , Blocking Port and Forwarding Port in Layer 2 STP topology
7 Answers Tech Mahindra, Wipro,
Is it possible that in a switched network that any port of the switch can be infected with any kind of viruses that jamed and create more traffic in network which cause slow network performance?
What is the default LMI type? A.) Cisco B.) ANSI C.) IETF D.) Q933a
Which of the following would be displayed by the command 'SHOW CDP NEIGHBOR DETAIL'? A.) The incoming/outgoing port. B.) The hardware platform. C.) One address per protocol. D.) Amount of Flash Memory Available E.) The routers hostname. F.) The subnet mask, if IP is configured.
What is the function of application layer in networking?
What is the standard ISDN term for a non-native analog telephone? A.) TE1 B.) TA C.) LE D.) TE2 E.) ET