Which two statements are true? (Choose two)
A. Ethernet 802.3 utilizes a half duplex method for data
transfer
B. In a 100 MBS point to point connection a full duplex
connection can provide 400 Mbs of data transfer
C. Ethernet switches can use the full duplex mode to connect
multiple nodes on a single pod of a switch
D. Full duplex Ethernet takes advantage of UTP using one
pair for transmission and the other pair for reception
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
Identify the default encapsulation on serial interfaces? A.) ISDN B.) HDLC C.) SDLC D.) Frame Relay E.) PPP
Identify the command to display the hardware platform information? A.) show all B.) show platform C.) display hardware D.) show version
The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments
Which show command should you use to view Frame Relay Local Management Interface (LMI) Frame statistics? A. show lmi B. show ip route C. show interface D. show statistics E. show frame-relay lmi
What is convergence time? A.) The update time B.) The time it takes to reload a router C.) The time it takes for a packet to reach its destination D.) The time is takes for all routers update their tables after a change takes place
Which configuration task must you complete if a remote Frame Relay router does NOT support Inverse APP? A.configure static maps B.define an IP address locally C.disable DHCP on the Frame Relay router D.configure a static route to the remote network
What is trigger rip and from which ios version it starts?
Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether
The maximum distance on a 10BaseT network from the hub to a workstation is which of the following? A.) 500 meters B.) 1000 meters C.) 100 meters D.) 1500 meters
I simulate ten routers r1 to r10 straightly. I want I can ping from the loop of r1 to loop of r10, but I want I cant ping r1 and r10 from inside routers.?
Mention the conversion steps of data encapsulation?