What is the distance limitation for 100BaseT?
A. 607 ft
B. 25 Meters
C. 1,000 ft
D. 185 Meters
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance
5. What is an advantage of using routers in your network? (Choose all that apply) A. Stops broadcast storms B. Reduces downtime on your network C. Creates internetworks D. Can filter by logical address
Can you explain transport and tunnel mode in detail with datagram packets?
What is the usage of service password encryption?
Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts
What is Summarization and supernetting and what its use?
What is true when using DDR? A.) HDLC is the preferred encapsulation B.) You must use static routing C.) You should use dynamic routing D.) You should use ISDN
Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session
Which peer authentication method and which ipsec mode is used to connect to the branch locations?
Which layer of the 7 layer model provides services to the Application layer over the Session layer connection? A.) Transport B.) Application C.) Session D.) Network E.) Datalink F.) Presentation
Identify 3 characteristics of ISDN? A.) Transports voice and data B.) Transports voice only C.) Support both BRI and PRI D.) Runs over existing phone lines E.) Same as X.25