Identify the command to run 'setup'?
A.) Router(config)#setup
B.) Router?setup
C.) Router#setup
D.) Router>setup
Which line from a show spantree 1 command output indicates that virtual LAN 1 (VLAN1) is functioning properly? A. Root pod is FastEthernet 0/26 B. Port Ethernet 0/1 of VLAN1 is Forwarding C. Designated port is Ethernet 0/1, path cost 10 D. Designated root has priority 0 address 00D0 588F B600 E. VLAN1 is executing the IEEE compatible Spanning Tree Protocol
What are the two most common transport layer protocols? UDP TCP IPX ARP
With one method for transmitting frames through a switch, the switch receives the complete frame and checks the frame CRC before forwarding the frame. What is the switch transmission method called? A. CSMA/CD B. Full Duplex C. Cut-Through D. Half-Duplex E. Fragmentation F. Store and Forward
The Cisco Discovery Protocol (CDP) periodically sends out a multicast packet (at layer 2). Which command will alter the default interval of 60 seconds? A.) cdp hold 111 B.) cdp wait 111 C.) cdp interval 111 D.) cdp 111 E.) cdp timer 111
Which of the follwing are true of standard half-duplex Ethernet circuitry? A. It is alternate one-way communication B. The receive (RX) is wired directly to the transmit (TX) of the remote station C. The transmit (TX) is wired directly to the receive (RX) of the remote station D. Collisions are not possible E. Both stations can transmit simultaneously
How does L2TP process?
Which three are typical operational phases in a basic connection oriented neloyord service? (Choose three) A. call setup B. data transfer C. load balancing D. call termination E. call priortization F. data segmentation G. data link identification
Which NetWare protocol works on layer 3--network layer--of the OSI model? A. IPX B. NCP C. SPX D. NetBIOS
What command can be used to test IPX connectivity? A.) Ping 2e.000.0045.8923 B.) Ping 192.168.100.1 C.) Ping ipx 2e.0000.0045.8923 D.) Ipx ping 2e.0000.0045.8923
What is the subnetmask of / 27 in network based and host based?
What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.