What does the following line for an access list do? 'access-list
101 deny tcp 3.4.5.0 0.0.0.255 any eq 23'
A.) deny all ftp traffic
B.) deny all ftp traffic from subnet 3.4.5.0
C.) deny all telnet traffic from subnet 3.4.5.0
D.) deny all ftp traffic to subnet 3.4.5.0
E.) deny all telnet traffic
Which of the following are characteristics of UDP? A.) UDP is connection oriented. B.) UDP is used with TFTP. C.) UDP is unreliable. D.) UDP is connectionless. E.) UDP is at the transport layer. F.) UDP uses no acknowledgements.
What is the distance limitation for 100BaseT? A. 305.955 ft B. 7283.46 inches C. 184 Meters D. 185 Kilometers
Tell me which cable called roll-over?
What is the difference between unicast, multicast, broadcast, and anycast?
Which command will start the process for a Cisco IOS file image upgrade? A.) download B.) copy tftp flash C.) copy flash tftp D.) download flash E.) network
In which access- list type you can't do editing?
9. Which STP state prevents the use of looped paths? A. Blocking B. Listening C. Learning D. Forwarding
what is stp.
When we use interface mode?
What are the Timer of RIP, IGRP, EIGRP and OSPF Routing Protocol?
1 what is private vlam 2 if there is a router which have two fast Ethernet from from fa0/0 192.168.10.0/24 network is connected from fa0/1 192.168.20.0/24 network is connected all bacsic routing is done will they communicate 3 what is difference between snmp v1 v2 and v3 what difference between name and stranded access list
What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops