IP extended access lists use which of the following as a
basis for
permitting or denying packets?
A.) destination address
B.) all of the above
C.) protocol
D.) source address
E.) port
Answers were Sorted based on User's Feedback
Which port are used by Viruses? TCP or UDP?
hi shain/sudeep and rest of all plz answer these question for help some one as soon as possible what is stub area what is transit area let there are three area in ospf a0 a2 and a3 if a2 and a3 is coneted through each other will they comnicate
What is a characteristic of Store and Forward switches? A.) They work at wire speed. B.) They are the same as Cut-Through switching in 'prune' mode. C.) They forward based on transport layer info. D.) They forward the frame before it is completely read. E.) They increase latency.
What parameter is used with statically assigned routers to tell packets which interface to use to reach a distant network? A.) Mask B.) Subnet C.) Default gateway D.) Interface
What is ISR or NonISR router? Difference between ISR or NonISR router?
as i m cccna holder ... then why i m going for bpo's ?
If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network, which encapsulation type would you select? A.) Q933a B.) ISDN C.) IETF D.) CISCO E.) ANSI
Of the following switching types, which one has the highest latency? A.) Cut-through B.) None C.) Store-and-forward D.) Fragment Free
What is the syntax to use to configure the port on a Catalyst 5000 switch? A.) slot port/type B.) type slot/port C.) port slot/type D.) port type/slot
1.i have to pcs in the network 192.168.1.1 202.55.88.16 2. if that fails shud go through 122.16.1.3 and and if that comes back active it shud go through 202.55.88.16 itself
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
Differentiate Logical Topology from Physical Topology