Describe End to End network services: (Choose all that apply)
A.) Best Route selection
B.) Accomplished Segment by Segment, each segment is autonomous
C.) Flow Control & Data Integrity
D.) Best efforts packet delivery
what is Bandwidth capping
How can you add the 192.168.100.0/30 network to EIGRP without involving the 192.168.100.4/30 network as well?
Which layer of the 7 layer model provides services to the Application layer over the Session layer connection? A.) Transport B.) Application C.) Session D.) Network E.) Datalink F.) Presentation
Name the command we give on privilege mode for coming back to user execution mode?
Explain the difference between named and extended acl?
Which 2 commands shows the Cisco IOS filename? A.) show IOS B.) show ver C.) show flash D.) show mem E.) show NVRAM
Operation of two PC connecting with brand new switches. (they expecting step by step arp ,broadcast,MAC table, RARP operation)
4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN
Which three tasks are required to confound a dial on demand routing (DDR) Basic Rate Interface (BRI) connection? (Choose three) A. define static routes B. confound the abler information C. specify the interesting franc that can enable the link D. define a DDR password to exchange when the link comes up
What was the key reason the International Organization for Standardization released the OSI model? A. users could access network servers faster B. different vendor networks could work with each other C. the industry could create a standard for how computers work D. network administrators could increase the overall speed of their network
Which type of switching reads in the entire frame before forwarding it? A.) Pause-and -forward B.) Store-and-Forward C.) Inverse ARP D.) Fast Forward E.) Cut-Through F.) Routing
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's