Which two of the following are valid ways to have multiple
encapsulation
types on a single interface?
A.) This is not possible
B.) subinterfaces
C.) additional physical interfaces
D.) secondary addresses
What is the administrative distance for RIP? A.) 100 B.) 90 C.) 120 D.) 110
You are given the following address: 153.50.6.27/25. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.255.128, B,153.50.6.0, 153.50.6.127 B. 255.255.255.128, C,153.50.6.0, 153.50.6.127 C. 255.255.255.128, C,153.50.6.127, 153.50.6.0 D. 255.255.255.224, C,153.50.6.0, 153.50.6.127
What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards
What is difference between static and dynamic routing?
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
What is icmp protocol?
What is DLCI?
How much hold down time of eigrep protocol?
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version
Explain the difference between arp and rarp?
Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery