Which can be logged by IPX extended access lists?
A.) source address
B.) protocol
C.) source socket
D.) access list number
E.) destination socket
F.) destination address
If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2
Which OSI layer performs code conversion, code formatting and encryption? A.) Physical B.) Data-Link C.) Application D.) Transport E.) Presentation F.) Network
what is the main features of link state routing protocols?
Brielfly explain the conversion steps in data encapsulation
If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network, which encapsulation type would you select? A.) Q933a B.) ISDN C.) IETF D.) CISCO E.) ANSI
How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A. 4 B. 30 C. 60 D. 62 E. 112 F. 124
What is the IEEE specification for Spanning Tree Protocol? A.) 802.9 B.) 803.ud C.) 803 D.) 802.1d
Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) Token Ring E.) FDDI F.) TCP
Identify the OSI layer responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP
Suppose we have some switch in network and we are running RSTP how much convergence time will be there if one link down
Can you define in short what VPN is?
What are the generic parts of a network layer address? A. an intenetworks number and a URL B. a vendor code and a serial number C. a network number and a host number D. a broadcast number and a unicast number E. a domain identifier and a device identifier