Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify the purpose of ICMP?

A.) Avoiding routing loops

B.) Send error and control messages

C.) Transporting routing updates

D.) Collision detection

Answers were Sorted based on User's Feedback



Identify the purpose of ICMP? A.) Avoiding routing loops B.) Send error and control messages ..

Answer / guest

Answer: B

Is This Answer Correct ?    2 Yes 0 No

Identify the purpose of ICMP? A.) Avoiding routing loops B.) Send error and control messages ..

Answer / sudeep

options are wrong

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More CCNA Interview Questions

Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0

0 Answers  


Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do? A. It tells the router to check the corresponding bit value. B. It tells the router to ignore the corresponding bit value. C. It tells the router to check its alternate routing list. D. It tells the router to use its primary routing list.

2 Answers  


Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy

1 Answers  


Given the command 'cl?', what will it display? A.) Syntax of the 'clock' command B.) Syntax of the 'clear' command C.) All commands that begin with 'cl' D.) All commands that begin with 'c'

3 Answers  


What is the command to allow you to type Tokyo instead of the IP address 172.16.30.1 to access a router named Tokyo? A.) config t, ip host Tokyo 172.16.30.1 B.) config t, ip hostname Tokyo 172.16.30.1 C.) config t, hostname Tokyo 172.16.30.1 D.) config t, ip hostname 172.16.30.1 Tokyo

2 Answers  


Which command will show you if you have a DTE or DCE cable connected to an interface?

4 Answers   DFSS,


What is Summarization and supernetting and what its use?

4 Answers  


When you type google.com what are the process involved from layer 7-layer1?

3 Answers   Cisco, IIHT,


Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A) telnet B) ping C) trace D) bootp

4 Answers  


what is quota management?

2 Answers   HCL,


Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) Privileged exec is a subset of the user exec mode C.) They both require the enable password D.) User exec is a subset of the privileged exec mode

1 Answers  


What is difference between Store-and-Forward, cut-through, Fragment-Free Method?

2 Answers   HCL, Microsoft,


Categories