Which of the following are logged when IP access list logging is
enabled?
A.) source address
B.) protocol
C.) source port
D.) destination address
E.) access list number
F.) destination port
What is CIDR?
what do you mean by port triggering?
How the STP determinw that which Port should be Root Port, which port should be Designeted Port , Blocking Port and Forwarding Port in Layer 2 STP topology
7 Answers Tech Mahindra, Wipro,
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
Which range of possible numbers do standard ipx access lists have? A. 100 199 B. 600 699 C. 800 899 D. 1000-1099
Explian what is a node?
Which command switches from User mode to Privileged mode? A.) login B.) privilege C.) admin D.) enable E.) enter F.) root
Which Standard IP Access list commands will deny only the source address 1.1.1.1? A.) access-list 9 deny host 1.1.1.1 B.) access-list 9 deny 1.1.1.1 255.255.255.0 C.) access-list 9 deny 1.1.1.1 0.0.0.0 D.) access-list 9 deny 1.1.1.1 0.255.255.255 E.) access-list 9 deny 1.1.1.1 255.255.255.255
Hi all, suppose more than two network administrators are configure same router with different configuration through telnet at the same time.. then whose(admin's) configuration will use router for routing ?
Hi, Shahin Thanks a lot for providing me these sites. These links are really helpful for me. r u working somewhere please let me know
Identify 3 characteristics of ISDN? A.) Transports voice and data B.) Transports voice only C.) Support both BRI and PRI D.) Runs over existing phone lines E.) Same as X.25
What is the default bandwidth size of t1 routers?