The ICMP (referred to in PFC 1700) is implemented by all
TCP/IP hosts
A. true
B. false
Select the most correct statement regarding client port address assignment. The client port always matches the destination port. To access a web page the client uses the source port of 80 and the destination port is dynamically selected. When a client requests a web page the destination port is 80 by default and the source port for the client is dynamically selected. The client source port is 1024 to get web pages and 1055 when retrieving ftp files.
Hi all of you, Actually this is interview qe? but i did,t do explain it completely so please give reply recently and completly Ans, what is sub-interface and inter-vlan ? And How to implement it on cisco router & switches and also which series router switches supported please write..........
As system administrator, you type "debug ipx sap" and receive the following lines as part of the IOS response: type 0x4, "HELLO2", 199.0002.0003.0006 (451), 2 hops type 0x4, "HELLO1", 199.0002.0003.0008 (451), 2 hops What does "0x4" signify? A. That is a Get Nearest Server response. B. That it is a General query. C. That it is a General response. D. That it is a Get Nearest Server request.
What are the different memories that are used in a cisco router?
HI ALL , wanted to know if the rstp protocol.. rapid spanning tree protocol .. is imp to study with ccna's point of view or study of STP will be enough.. in some books rstp is nt given like todd lamle however in icnd2 its explained in detail.. please suggest asap .. thanks ..
What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II
How many access lists are allowed per interface? A. One per port, per protocol B. Two per port, per protocol C. Unlimited D. Router interface +1 per port.
Can you explain PPP protocol?
In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.
What command can you type to view the connections after telneting into multiple routers simultaneously? A.) sh users B.) sh ports C.) sh host D.) sh sessions
Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link. A.) RFC 1661 B.) High Level Datalink Protocol (HDLC) C.) Challenge Handshake Authentication Protocol (CHAP) D.) SS7 E.) Link Control Protocol (LCP)
What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.