What is a key use of a device hardware address?
A. to obtain a vendor code / serial number from the user
B. to transmit a frame from one Interface to another Interface
C. to transmit a packet from one local device to another
local device
D. to transmit data from one local device to a remote device
across the internet
E. to contain logical information about the device to use
for end-to-end transmission
Which command listed below sets the banner message when someone connects to the router? A.) message # B.) banner # C.) login banner # D.) description # E.) login description # F.) banner motd #
What is Transport and Tunnel mode?
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
What is the connection oriented protocol in the TCP/IP protocol stack? A. IP B. UDP C. TCP D. DNS E. OSPF
What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards
In IPSec what is SAD, SPD and SA's?
Identify the 2 methods to modify the routers boot sequence? A.) Setup program B.) Boot system commands C.) RXBoot D.) Config-register
what is ping utility and how to work.
hi friends i have a problem.plz solve this. i am working some where and i have the number of swtitch.once my project manger says that we are going to exapnd our number of employ so plz attech an another switch.i asked to my jr network engineer that take a witch and implemnt on that n/w,as he implement the switch on that n/w.thats network get down, plz tell me what is the reason of that.
Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers C.) Triggered updates D.) Split horizon E.) Area hierarchies F.) Order of router startup
Which command assigns the login password CISCO on the console terminal line? A. line vty 0 login password cisco B. line console login password cisco C. line login terminal password cisco D. line console 0 login E. line console 0 login password cisco
What are two purposes for segmenting a network with a bridge? (Choose two) A. to reduce collisions B. to increase collisions C. to add collision domains D. to reduce collision domains E. to have more broadcast domains