Which can be true regarding VLANs?
A.) They are created by location
B.) They are created by function
C.) They are created by department
D.) They are created by group
IPX traffic using different encapsulation types can go over the same data link A. true B. false
Which of the following are Session Layer standards? A.) ASCII and EBCDIC B.) MPEG and MIDI C.) RPC and SQL D.) JPEG and PICT
Identify the 2 types of access-list filters that control SAP traffic? A.) Novell-ether B.) Arpa C.) Input-sap-filter D.) Round-robin E.) Output-sap-filter
Explain the difference between tftp and ftp application layer protocols?
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6
Which service uses telephone control messages and signals between the transfer points along the way to the called destination? A. Signaling System 7 (SS7) B. Time-division Multiplexing (TDM) C. X.25 D. Frame relay
You would like to have a notation that when a user issues the command 'show interface serial 0', a line is displayed indicating that, 'This is the connection to Company A.' What interface command would accomplish this? A.) banner motd #This is the connection to Company A.# B.) interface This is the connection to Company A. C.) This cannot be done for an individual interface. D.) description This is the connection to Company A. E.) banner This is the connection to Company A. F.) display This is the connection to Company A.
Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config
Can you explain the broader steps of how L2F establishes the tunnel?
The Cisco IOS is stored in: A.) ROM B.) CD C.) Flash D.) NVRAM
Choose the following that are benefits to segmenting with router: A.) Flow Control B.) Manageability C.) Multiple Active Paths D.) Explicit packet lifetime control