What is the standard ISDN term for a non-native analog
telephone?
A.) TE1
B.) TA
C.) LE
D.) TE2
E.) ET
Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from __________. A. IGRP B. RIP C. IP D. TCP
Bridges work at what layer of the OSI model? A.) Data Link B.) Network C.) Physical D.) Application
12 Answers KVS, PGT,
Why would you use static routing instead of dynamic routing? A.) When you want automatic updates of the routing tables B.) All the time C.) When you have very few routes and want to conserve bandwidth D.) When you have a gateway of last resort
hi everybody anybody have doubts in ccna please contact with me we will provide the solutions of the networking questions.my contact no. is 9885382098,abdulkhalid.5@gmail.com.
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
Define network?
how we update the IOS version with the help of TFTP?
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
what does PPTP use for encryption and authentication?
What is the size of an ip address?