Why would you use static routing instead of dynamic routing?
A.) When you want automatic updates of the routing tables
B.) All the time
C.) When you have very few routes and want to conserve bandwidth
D.) When you have a gateway of last resort
as i m cccna holder ... then why i m going for bpo's ?
Which layer hides details of network dependent information from the higher layers by providing transparent data transfer? A.) Transport B.) Physical C.) Data Link D.) Session E.) Application F.) Network
Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack
Can you explain how L2F data tunneling process works?
What is the result of using a hierarchical addressing framework? A. increased availability of addresses B. decreased distance between routers C. increased router memory requirements D. no need to maintain routing information
Explain what are partial updates?
I want to configure a serial interface on a 7500 with a VIP card. What global config command would give me access to a serial interface on a 7500? A.) int 1/0/0 B.) int s 1/0/0 C.) int s 1/1 D.) int s0.1 E.) int s1
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface
Who controls mac address uniqueness and how?
Why ESP Transport mode is not compatible with NAT????? Though New IP Header in Tunnel mode & Original IP Header in Transport mode are out of Authentication & Encryption.
Differentiate full-duplex from half-duplex.