Based upon the 1st octet rule identify the range for a Class A
address?
A.) 1 - 126
B.) 192 - 223
C.) 128 - 191
D.) 1 - 191
Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether
take a pen and copy before solving that question there is a router name Ra there is two switch sw1 and sw2 sw1 is coneceted through fa0/1 interface of router Ra sw2 is conected through the fa1/1 serai interface of router s0/1 conected through the isp with it ip address 192.168.1.1 now therer are three host conexted through the sw1 and having ip host1=10.1.2.1 host2=10.1.2.2 host3=10.1.2.3 now there is also 3ree host conected through switch 2 i.e sw2 having ip host4=10.1.1.1 host 5=10.1.1.2 host 6=10.1.1.3 now i think u have made corect confrigation.now questios is started network admin configure the Ra router in that fassion Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255 Ra(config)#line vty 0 4 ra(config)#access-class 2 in now question is that why should network admnistratoe do it in this maneer A to give access sw1 host to acess internet B to prevent sw1 host from acessing comand promt c to prevent sw2 host from accessing console of router ra D to give sw2 host access to the enternet e prevent sw1 host from accessing internet f to prevent sw1 host from acessing the sw2 host network isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6) | | (sw1)------host 1,2,3 this is not exect digarm but help to derive the diagram plz answer as soon as possible
What is the most common layer 2 device? A. Hub B. Bridge C. Switch D. Router
Can you explain CHAP?
Significance of IP helper-address Command on SW? Is it necessary to put this command?
Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17
Given the following IP address from the Class C address range 192.168.21.12. Your network plan needs addresses for 28 small prkps Each office uses its own shored. The network design specifies that you confound for five bits of subnetting. When you confound for this in Cisco IOS software which shored mask should you use? A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248 E. 255.255.255.252
A traffic light is an example of what type of mechanism? A.) Collision detection B.) Flow control C.) Sequence numbering D.) Network management
The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability
What is formula of hold down time of eigrp protocol?
A router blocks ___________ Broadcasts Unicasts All packets Nothing
Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM