Which command successfully pings an individual IP address?
A. Router> ping 192.5.5.0
B. Router# ping 192.5.5.30
C. Router> ping 192.5.5.256
D. Router# ping 192.5.5.255
Answers were Sorted based on User's Feedback
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
1. What is an advantage to LAN segmentation? A. Provides multiprotocol support B. Decreases security C. Decreases broadcasts D. Increases broadcasts
What is true when creating static route? A.) The mask parameter is optional B.) The administrative distance is required C.) The gateway parameter is required D.) The administrative distance is optional
Define network?
What purpose does aging serve in a link state protocol?
How many parts of ping?
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward
What is the purpose of the DLCI? A.) Identifies the remote routers B.) Contained with a 802.2 frame for routing purposes C.) Used with PPP during authentication D.) Identifies the PVC in a Frame Relay network
Identify the command that will display the RIP routes entering and leaving the router? A.) Router(config)# debug ip rip B.) Router# debug ip rip C.) Router>debug ip rip D.) Router# debug rip routes
what is the main features of link state routing protocols?
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address