What ISDN protocol specifies concepts, terminology, and
services?
A.) Q
B.) S
C.) I
D.) E
How does a switch use store and forward? A.) By using a Class I repeater in a collision domain B.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface C.) By using broadcast addresses as source addresses D.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets
In Cisco IOS software which command displays the backup configuration? A. show flahh B. show version C. show tftp-config D. show backup-config E. show startup-config
Identify the 2 commands that will display the status and information about interface E0 only? A.) show interface ethernet E0 B.) show interface E0 C.) show E0 D.) show int E0 E.) show interface
Tell me how much hold down time of eigrep protocol?
Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP
Fried i am jitendera here.i donot know this is ccna question or not but i need some help friend i am in love and i donot know how to propose.this is my felling that she also like me but she want that i have to prosed first i am little bit shy boy how cam i propose without risk please answer this question befor any another person propose her please please please
Why we used Virtual MAC in GLBP
Which command would show all Ethernet interfaces with IPX configured on them? A.) show interface ipx ethernet B.) show ipx interface C.) show ipx interface ethernet D.) show ipx E.) show version F.) show run
Can yo define LNS
Explain the difference between bus topology and hub?
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
Explain the matric of eigrp protocol?