What command can you type to view the connections after
telneting
into multiple routers simultaneously?
A.) sh users
B.) sh ports
C.) sh host
D.) sh sessions
What is the routing metric used by RIP? A.) Route poisoning B.) Split horizon C.) Hop Count D.) TTL
Which 2 protocols are in wan technology?
When you issue the command show version your router returns "Configuration register is 0x0101" From where does the router boot? A. ROM B. NVRAM C. Flash D. a TFTP server
What is the extended IPX access list range? A.) 901-1000 B.) 100-199 C.) 900-999 D.) 1000-1000
What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.
Which two statements about a bridge are true? (Choose two) A. A bridge floods multicasts B. A bridge floods broadcasts C. A bridge does not flood multicasts D. A bridge does not flood broadcasts
Define topology?
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
What is Data, management, native, default,trunk and access vlan?
Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session
Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector
Which IP packet field will prevent endless loops? type-of-service identificationf lags time-to-live header checksum