Identify the command to configure DLCI 100 on an interface e0?
A.) Router(config)# frame-relay local-dlci 100
B.) Router(config)# frame-relay local-dlci 100 int e0
C.) Router(config-if)# frame-relay local-dlci 100
D.) Router(config-if)# frame-relay local-dlci 100 int e0
What is a backoff on an 802.3 networks A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. it is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged.
I received a call from client that network is down. We have 100 or 1000 of switches and routers so how could we find the client switch and its port number? and useful commands to find this ?
How we can find ASBR Router, we have no authentication to enter router?
How many parts of ping?
Which command loads a new version of the Cisco IOS into a router? A. copy flash ftp B. copy ftp flash C. copy flash tftp D. copy tftp flash
What is the purpose of data link layer?
Which protocol is used for booting diskless workstations? A.) IP B.) ARP C.) RARP D.) TCP E.) SNMP
Your PC has been configured with IP Address 192.168.3.25 and a subnet mask of 255.255.255.0. Which of the following IP Addresses is a valid default gateway address for your PC? 192.168.3.0 255.255.255.0 192.168.3.2 255.255.255.0 192.168.3.25 255.255.255.0 192.168.4.1 255.255.255.255
completly describe th steps fo osi model when you enter http:/youtube.com
friends i have some problem in the acess list plz help me out. purbi sinha. 1 what is the diffrence b/w inbound and out bound access list 2 what is main diffrence betwwen standred acesslist and extended access list 3 where should i keep stnadred access list and exatended access list i mean at which interface and why? 4 why wild card masking is used 5 what is switch febric in switching plz help me out i am litle bit confuse
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
Identify 3 characteristics of a connection oriented protocol? A.) Path determination B.) Flow control C.) Acknowledgements D.) Uses hop count as metric E.) 3 way handshake