Which command should you use to create an IP standard access
list?
A. access-list standard 172.16.4.13
B. access-list 1 deny 172.16.4.13 0.0.0.0
C. access-list 100 deny 172.16.4.13 0.0.0.0
D. access-list 198 deny 172.16.4.13 255.255.255.255
Answers were Sorted based on User's Feedback
How does cut-through LAN switching work?
Brielfly explain the conversion steps in data encapsulation
1.i have to pcs in the network 192.168.1.1 202.55.88.16 2. if that fails shud go through 122.16.1.3 and and if that comes back active it shud go through 202.55.88.16 itself
Which is not a common problem with Distance-Vector routing? A.) Slow convergence. B.) Complex configuration. C.) Routing loops. D.) Periodic updates can slow convergence. E.) Counting to infinity.
Mention what is bootp?
Can you explain the difference between trusted and untrusted networks?
What route entry will be assigned to dead or invalid route in case of RIP?
Identify the 2 commands that save the running-config to a TFTP server? A.) write running tftp B.) copy running network C.) copy running tftp D.) write network
Which layer is responsible for routing through an internetwork? A.) Physical B.) Session C.) Network D.) Transport E.) Application F.) Data Link
What is ospf? Describe it.
Which ipsec rule is used for the olympia branch and what does it define? (Choose two)
Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether