Which technology is used by Catalyst switches to resolve
topology loops and ensure data flows properly through a
single network path?
A. virtual LANS (VLANS)
B. frame filtering
C. cut-through switching
D. spanning-tree protocol
Answers were Sorted based on User's Feedback
Which two of the following are valid ways to have multiple encapsulation types on a single interface? A.) This is not possible B.) subinterfaces C.) additional physical interfaces D.) secondary addresses
what are the 3ree way for implementing vlan on cisco switches what is the layer hierarchy of the cisco what is the best place of implementing standard access list what is q stand for isdn these are the challanging question for me i am waiting for jitendera sinha answer(it is challenge for u i have seen lots of answer given by u )it is a challenge in the frendshipmode plz donot take other wise
hi im ccna certified im searching 4 job in networking domain can any guide wats the rite way of job approach ,wat r the rite sites for searching job im eagerly 4 ur replies
what is the major difference between EIGRP & IGRP?
The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.
How do we do encryption and authentication in L2TP?
what is route aggregation
Identify the 3 key features of the Cisco Discovery Protocol? A.) Off by default B.) Will allow for the discovery of layer 3 addresses on neighbor routers C.) Verifies connectivity D.) Open standard E.) Does not require any layer 3 protocols to be configured
what is lmi? how many type of lmi's we are using ...
What is the syntax to add a banner to the Cisco router? A.) motd banner # B.) banner C.) banner motd # D.) banner #
What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic
Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers C.) Triggered updates D.) Split horizon E.) Area hierarchies F.) Order of router startup