Which two physical interfaces support PPP? (Choose two)
A. Ethernet
B. Token Ring
C. Synchronous serial
D. Asynchronous serial
Which of the following will show an extended access list 150? A.) sh access-list 150 B.) sh ip int C.) sh ip access-list D.) sh access-list 150 extended
Which statement about Ethernet networks is true? A. The advantage of a full duplex is the ability to transmit data over 111 cable B. Full duplex Ethernet requires a point-to-point connection when only two nodes are present C. Ethernet switches can use full duplex mode to connect multiple nodes to a single pod of a switch D. Half duplex is a cut through packet processing method that is vow fast little error correction Full duplex is a store and forward method that is slower but has better error correction
To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks? A. Each router builds its own SAP table and forwards that every 60 seconds. B. Each router assigns a service number and broadcasts that. C. SAPs aren't necessary with Cisco routers. D. Cisco routers filter out all SAPs.
Do you found the Cisco Certification 642-067 exam Guide ?
Given the following IP address from the Class C address range 192.168.21.12. Your network plan needs addresses for 28 small prkps Each office uses its own shored. The network design specifies that you confound for five bits of subnetting. When you confound for this in Cisco IOS software which shored mask should you use? A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248 E. 255.255.255.252
Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding
Which three are typical operational phases in a basic connection oriented neloyord service? (Choose three) A. call setup B. data transfer C. load balancing D. call termination E. call priortization F. data segmentation G. data link identification
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
What does the command "IP name-server 255.255.255.255" accomplish? A. It sets the domain name lookup to be a local broadcast. B. This is an illegal command. C. It disables domain name lookup. D. The command is now defunct and has been replaced by "IP server-name ip any"
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
Which commands will restart the router? A.) router#system exit B.) router >reload C.) router#shutdown D.) router#reload E.) router#(config)reload F.) router#system restart
What information is provided by the local management interface (LMI)? A.) LMI encapsulation type B.) The current DLCI values C.) The status of virtual circuits D.) The global or local significance of the DLCI values