You would like to have a notation that when a user issues
the command
'show interface serial 0', a line is displayed indicating
that, 'This is
the connection to Company A.' What interface command would
accomplish this?
A.) banner motd #This is the connection to Company A.#
B.) interface This is the connection to Company A.
C.) This cannot be done for an individual interface.
D.) description This is the connection to Company A.
E.) banner This is the connection to Company A.
F.) display This is the connection to Company A.
Which three protocols are correctly matched to their transport layer functions? (Choose three) A. route selection IP B. sliding window UDP C. well known pods IP D. route validation ICMP E. connection oriented TCP F. three-way handshake TCP G. no sequence and acknowledgement UDP
What does the 'S' mean when looking at the routing table? A.) Statically connected B.) Directly connected C.) Dynamically attached D.) Shutdown route
What ISDN protocol specifies concepts, terminology, and services? A.) Q B.) S C.) I D.) E
What is the juncture at which the CPE ends and the local loop portion of the service begins? A. Demarc B. CO C. Local loop D. Last-mile
What is the igp (interior gateway protocol)?
Identify the command to reload the router? A.) Router(config)# reload B.) Router# reset C.) Router# reload D.) Router> reload
Explain protocol?
Why we using Tcp/IP. Why we can't use just Tcp ip? What is the meaning of '/' symbol in between this?
What does the command show access-lists 101 list? A. all defended access lists B. all access lists within the router C. the contents of standard access list 101 D. the contents of defended access list 101
Each department has its own file server and the company has an enterprise server that is shared by all departments. What does a network administrator use to provide a secure separation between the management and sales departments? A. a bridge between management and sales B. routers to provide the most secure segmentation C. a hub to provide ease of management and a satisfactory alternative for network security D. an Ethernet switch to maintain secure separationthrough programming the access lists for each port of the switch
What is subnetting and why it is use?
What is the subnetmask of / 27 in network based and host based?