Which two protocol tools use ICMP? (Choose two)

A. ping

B. telnet

C. configure

D. traceroute

E. show commands

F. standard access lists

Answers were Sorted based on User's Feedback



Which two protocol tools use ICMP? (Choose two) A. ping B. telnet C. configure D. trace..

Answer / guest

Answer: A, D

Is This Answer Correct ?    45 Yes 0 No

Which two protocol tools use ICMP? (Choose two) A. ping B. telnet C. configure D. trace..

Answer / kapilasdhir

A. ping
D. traceroute

Is This Answer Correct ?    19 Yes 0 No

Which two protocol tools use ICMP? (Choose two) A. ping B. telnet C. configure D. trace..

Answer / guest

a d

Is This Answer Correct ?    17 Yes 2 No

Post New Answer

More CCNA Interview Questions

8. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges in your network C. When you install routers in your network D. When you use Switches configured with multiple VLANS

5 Answers  


How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain

1 Answers  


Hi, If we create more Gateway from one our Router Interface Gateway (Example: by set up a ISA server etc) will it effect on our bandwidth to be low? please help me

5 Answers  


Which command line option will determine what traffic is interesting enough to establish a dialup connection? A.) dialer map B.) dialer string C.) dialer in-band D.) dialer-list E.) dialer negotiation

1 Answers  


When we use loop back ip?

0 Answers  






Which mode called privilege mode?

0 Answers  


Which dynamic type draw back is, if single link down, it removes its routing table?

0 Answers  


hello sir , if i finish this certification is the job is conform ?? and in chennai were i can do this ??

1 Answers  


What are the protocols that are used by every layer of ip/tcp model?

0 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

1 Answers  


What are the Timer of RIP, IGRP, EIGRP and OSPF Routing Protocol?

1 Answers  


Your network is having IP problems connecting to one or more Frame Relay peer routers. Which two commmands should you use to show the routers that are reachable? (Choose two) A. show ip map B. show ip router C. show frame-relay map D. debug frame-relay map

1 Answers  


Categories