Which two steps are required to confound and apply standard
access lists on an interface? (Choose two)
A. define an access list number and its parameters
B. enable an interface to become part of the access list group
C. define the number of access lists to be supported on an
interface
D. copy the access list definition to each interface that
will support it
Answers were Sorted based on User's Feedback
What is the function of application layer in networking?
What are the two types of transmission technology available in ccna?
Hi Friend. i have to let you know that now i have been selected for cisco india in bangalore. i am thanking to all of you guys that u have been posted such good question and the respective answer. from today i will be not able to visit this site on regular basic and hopeing that you will continue to post the question.the question you are posting is not very usefull to you but also usefull to another. i am again thanking to all of you and hope for best for your feature. Jitendera kumar sinha Network engineer-L2 cisco india Bangalore
what is difference between hub and switch?
Identify the length of an IPX address and it's components? A.) 80 bits, 48 bits network and 32 bits node B.) 32 bits, 16 bits network and 16 bits node C.) None of the above D.) 80 bits, 32 bits network and 48 bits node
what is stub router
What are the protocols that are used by every layer of ip/tcp model?
Company XYZ has an employee that works out of the home. The employee runs big client server applications and must quickly transfer large files. The company wants the best cost/benefit on this connection. What would be the most practical solution? A. an ISDN Basic Rate Interface (BRI) connection to the user at home B. a dedicated T1 connection to the user at home C. a dedicated Frame Relay connection to the user at home. D. a standard 28.8 analog dialup connection to the user at home.
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
Which ISDN specification deals with call Setup and Teardown? A.) Q-Series B.) J-Series C.) I- Series D.) C- Series E.) F-Series
When configuring the subnet mask for an IP address, which formats can be used?A. dotted-decimal. B. Hexadecimal C. Bit-count D. Octal E. Binary
Identify the protocol to test connectivity without configuring any layer 3 protocols? A.) TCP B.) Ping C.) IP D.) CDP E.) Telnet