What is the IEEE specification for Spanning Tree Protocol?
A.) 802.9
B.) 803.ud
C.) 803
D.) 802.1d
Explain the types of communication in ipv4?
What is the default encapsulation of Netware 3.12? A.) Ethernet_II B.) 802.5 C.) 802.2 D.) 802.3
Which of the following is a layer 2 device? A.) Switch B.) Router C.) Repeater D.) Hub
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
Which command do you use to set the Privileged mode password to 'clearwater'? A.) set password=clearwater B.) enable privilege password clearwater C.) enable password clearwater D.) enable login clearwater E.) enable secret password clearwater F.) ebable clearwater
Hello Every one. Can anyone please explain me the 7 OSI Layers with some general example? I am trying to learn it from last few months but i cant i realy need it. Thanks
Explain the difference between routable and non- routable protocols?
I have one problem in my network my windows xp pc in workgroup there r 2 NIC card one I have disable in and second is active. The problem is in a day some time its ip conflict with other and when I see the event log and get the conflict ip mac and scan it with LAN scanner on one is there for that mac address nic in my network I have disable dhcp also don’t know what is the problem
Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter
What does the IPX maximum path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)
Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199
What is Phase od VPN in site to site and what information you will require to configure a SITE to SITE VPN