What does the following line for an access list do? 'access-list
101 deny tcp 3.4.5.0 0.0.0.255 any eq 23'
A.) deny all ftp traffic
B.) deny all ftp traffic from subnet 3.4.5.0
C.) deny all telnet traffic from subnet 3.4.5.0
D.) deny all ftp traffic to subnet 3.4.5.0
E.) deny all telnet traffic
Tell me how much hold down time of eigrep protocol?
What type of switching creates variable latency through the switch? A.) Cut-Through B.) Inverted C.) Layer 4 D.) Multiplexed E.) Store and Forward
Which is the protocol using multiple tcp/ip connections? SLIP or PPP
Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0
Which OSI layer defines end to end communication, segmentation and re-assembly? A.) Network B.) Transport C.) Physical D.) Application E.) Data-Link F.) Presentation
For IPX, what is the DEFAULT Cisco Encapsulation on an Ethernet interface? A.) novell-ether B.) gns C.) snap D.) arpa E.) sap F.) dix
The network portion of an address typically represents a: A.) Router B.) Ethernet MAC address. C.) Computer D.) Host E.) Segment
What are four benefits that can result from applying ISDN networking? (Choose four) A. Full time connectivity across the ISDN is spoofed by Cisco IOS routers using dial on demand routing (DDR) B. Small Once and Home Once sites can be economically supported with ISDN Basic Rate Interface (BRI) servkps C. ISDN replaces Signaling System 7 (SS7) in the Public Switched Telephone Network (PSTIC) backbone D. ISDN can be used as a backup service for a leased line connection between the remote and central chaps E. Modem racking and cabling can be eliminated by integration of digital modem cards on Cisco IOS Network Acess Servers (NAS)
Difference between Distance vector, Link state protocols
why we use AS no. in IGRP and EIGRP?
At what layer of the OSI reference model does FRAME-RELAY map to? A.) Session B.) Physical C.) Network D.) Presentation E.) Transport F.) Datalink
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet