What is the maximum hop count for Link-State protocols?
A.) 15
B.) there is no hop count limit
C.) 256
D.) 16
Answers were Sorted based on User's Feedback
Answer / diego holmes
255 é a resposta correta, porém 256 envenena a rota. Como exemplo Slit Horizont
| Is This Answer Correct ? | 0 Yes | 0 No |
What is the default LMI type? A.) Cisco B.) ANSI C.) IETF D.) Q933a
Which of the follwing are true of standard half-duplex Ethernet circuitry? A. It is alternate one-way communication B. The receive (RX) is wired directly to the transmit (TX) of the remote station C. The transmit (TX) is wired directly to the receive (RX) of the remote station D. Collisions are not possible E. Both stations can transmit simultaneously
What is the default encapsulation and frame type on an Ethernet interface when enabling Novell? A.) SNAP B.) Ethernet_II C.) 802.2 D.) 802.3 E.) SAP F.) Token_SNAP
Given the command 'cl?', what will it display? A.) Syntax of the 'clock' command B.) Syntax of the 'clear' command C.) All commands that begin with 'cl' D.) All commands that begin with 'c'
the situation iz like ths -at a specific time in our company the internet connectivity goes off...v hav two networks in our company...but out of it only one link goes down for 5-10 sec...a fastethernet port becomes down for few sec and automatically becomes Up... Is this occures becoz of Power?? If yes thn y the 2nd network is not affected??
Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group
1.i have to pcs in the network 192.168.1.1 202.55.88.16 2. if that fails shud go through 122.16.1.3 and and if that comes back active it shud go through 202.55.88.16 itself
Differentiate between broadcast domain and collision domain
what is native vlan any one explain sooraj
Which of the following is an invalid host address using a netmask of 255.255.255.192? A.) 10.1.1.1 B.) 10.1.1.66 C.) 10.1.1.130 D.) 10.1.1.127
What is the difference between simple authentication and md5?
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments