Novell NetWare has an Ethernet frame type called
Ethernet_II. What
is the
matching Cisco command line keyword for this encapsulation
method?
A.) dix
B.) sap
C.) arpa
D.) gns
E.) snap
F.) novell-ether
What is the result of using a hierarchical addressing framework? A. increased availability of addresses B. decreased distance between routers C. increased router memory requirements D. no need to maintain routing information
which utility should use to test whether TCP/IP has been initialized on a system.friends plz post the answer with explaination..
Which OSI layer handles physical address, network topology? A.) Presentation B.) Physical C.) Transport D.) Application E.) Data-Link F.) Network
Identify the command to disable CDP on an interface? A.) Router(config-if)# no cdp enable B.) Router(config-if)# no cdp run C.) Router# no cdp enable D.) Router(config-if)# no cdp
Bridges work at what layer of the OSI model? A.) Data Link B.) Network C.) Physical D.) Application
12 Answers KVS, PGT,
I am just getting into this,I want to jump ahead a do the packet tracers in discovery working at a small to medium business or ISP but I am trying to get the last lab putting it all together. Does anyone have anything for this. I know it is ahead of me but I would like to get this so I can look at the beginning and understand it more
Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1
What is default size of hello packets in ospf?
Identify 3 characteristics of ISDN? A.) Transports voice and data B.) Transports voice only C.) Support both BRI and PRI D.) Runs over existing phone lines E.) Same as X.25
Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) Privileged exec is a subset of the user exec mode C.) They both require the enable password D.) User exec is a subset of the privileged exec mode
Which technologies listed below help prevent network loops in a switched (bridged) environment? A.) Store-and-Forward B.) IEEE 802.1d C.) Diikjstra Algorithm D.) Cut-Through E.) Spanning Tree Protocol F.) Routing
Identify the command to reload the router? A.) Router(config)# reload B.) Router# reset C.) Router# reload D.) Router> reload