Identify the following command to configure a secret password to
'cisco'?
A.) Router(config)#enable password cisco secret
B.) Router(config)#enable secret cisco
C.) Router(config)#enable secret password cisco
D.) Router(config)#set secret = cisco
You receive "input filter list is 800 and output filter list is 801" as part of the output from a show interfaces command. What kind of traffic are you filtering? A. IPX/SPX B. TCP/IP C. LocalTalk D. DDR
Which type of switching reads in the entire frame before forwarding it? A.) Pause-and -forward B.) Store-and-Forward C.) Inverse ARP D.) Fast Forward E.) Cut-Through F.) Routing
You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode
10 Answers Intel, Quark, Wipro,
Identify 2 PPP characteristics? A.) Is proprietary to Cisco B.) Supports authentication C.) Support compression D.) Run on a multi-access network
Identify the X.25 addressing standard? A.) X.121 B.) X.25a C.) ITU-1 D.) Q933a
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers C.) Triggered updates D.) Split horizon E.) Area hierarchies F.) Order of router startup
An ISDN BRI circuit can be described as which of the following? A.) 3B channels B.) 2-64Kbps B channels and 1-16Kbps D channel C.) none of the above D.) 2-64Kbps B channels and 1-16Kbps C channel
What type of switching creates variable latency through the switch? A.) Cut-Through B.) Inverted C.) Layer 4 D.) Multiplexed E.) Store and Forward
You can access three forms of WAN services with Cisco routers. Select the three forms: A. Switched or relayed services B. Interface front end to IBM enterprise data center computers C. Using protocols that connect peer-to-peer devices like HDLC or PPP encapsulation. D. IPX/SPX E. NetBEUI
What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16
hello friends im murtaza frm indore... and my question is that im doing hardware engenering and networking and im intrested in make a good career in networking so can you suggest.. which institiue is good for me...plzzz replyy im waiting...