What is the IEEE specification for Spanning Tree Protocol?
A.) 802.9
B.) 803.ud
C.) 803
D.) 802.1d
Which of the following are examples of ICMP? A.) Traceroute B.) Web Browsing C.) Ping D.) Telnet E.) Destination Unreachable message from a router F.) Inverse Tunnels
hello friend i have answerd more time of your question or doute.now i am seeing towards you for help,plz send the soln before monedya the problem is i have three router r1 and r2 and r3 they are conested in that maneer thai is r1---r2---r3---server | | server bothe server have diffrent ip now i have to implemnt access list on the r3 router in such a way that user from r1 can access only one server while user from r2 can access whole servre i ahve done it but both user of r1 and r2 uses all server i need help please help me this time? i have repalsced my firwall by r3 router so bacicaly i have to implement it on my firewall but you tell me on cisco router please help
EIGRP send query reply & Acknowledgment on which address ?
Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router router?
Ping uses which Internet layer protocol? A.) RARP B.) ICMP C.) ARP D.) FTP
Hi, Jitendra thanks for giving me answer of intervlan routing. it helps me to clear my concepts. Actually I am appearing for CCNA globel Certification exam in next month can some provides me tips for preparing exams. for ex. Notes, dumps on my email. umesh.pede402@gmail.com
What are hold-downs used for? A.) To prevent regular update messages from reinstating a route that has come back up B.) Information received on an interface cannot be sent back out the same interface C.) To prevent regular update messages from reinstating a route that has gone down D.) To hold the routing table from being sent to another router
Which encapsulation methods are most commonly used with dialup Integrated Services Digital Network (ISDN)? A. IP and IPX B. IP and PPP C. PPP and SDLC D. PPP and HDLC
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.
Which two protocol tools use ICMP? (Choose two) A. ping B. telnet C. configure D. traceroute E. show commands F. standard access lists
If i had 400 computers set in a site how many VLAN i should configure so that i can share a proper bandwith,and also i had two lease line connection of 2Mbps each,