Which layer hides details of network dependent information from
the higher
layers by providing transparent data transfer?
A.) Transport
B.) Physical
C.) Data Link
D.) Session
E.) Application
F.) Network
Answers were Sorted based on User's Feedback
Explain what is the size of hello packets in eigrep protocol?
In which ios version 182 people can access router through telenet?
Suppose we are having two Switches i.e. Switch1 & Switch2 Port1 of Switch1 is Connected to Uplink and switch2 is also connected to switch1? So 1>Is there is any loop? 2>How we come to know that there is a loop created? 3>If we add Switch3 to switch2 then there is a possibility of loop Creation?
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
what is vlan and how will you configure vlan on 3650 switch and how many valn can you create on that switch
Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0
Which command will enable CHAP authentication on a serial interface that is using PPP? A.) encapsulation chap B.) ppp chap C.) ppp enable chap D.) ppp encapsulation chap E.) ppp authentication chap F.) ppp chap enable
Which dynamic type draw back is, if single link down, it removes its routing table?
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
. Which command sequence will allow only traffic from network 185.64.0.0 to enter interface s0? A. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-list 25 out B. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-group 25 out C. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-list 25 in D. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-group 25 in
Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.