IPX traffic using different encapsulation types can go over
the same data link

A. True

B. False



IPX traffic using different encapsulation types can go over the same data link A. True B. Fal..

Answer / guest

Answer: True

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group

1 Answers  


To prevent Service Advertisements (SAPs) from flooding a network, Cisco routers do not forward them. How are services advertised to other networks? A. Each router builds its own SAP table and forwards that every 60 seconds. B. Each router assigns a service number and broadcasts that. C. SAPs aren't necessary with Cisco routers. D. Cisco routers filter out all SAPs.

1 Answers  


How does L2TP process?

0 Answers   CCIE,


hello friends im murtaza frm indore... and my question is that im doing hardware engenering and networking and im intrested in make a good career in networking so can you suggest.. which institiue is good for me...plzzz replyy im waiting...

1 Answers  


What not a name of an ISP? A. MSN B. Comcast C. Verizon D. McDonalds

2 Answers  






What is the syntax to use to configure the port on a Catalyst 5000 switch? A.) slot port/type B.) type slot/port C.) port slot/type D.) port type/slot

1 Answers  


Value in which type of access list?

0 Answers  


Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link

2 Answers  


Identify the X.25 addressing standard? A.) X.121 B.) X.25a C.) ITU-1 D.) Q933a

1 Answers  


Completely describe the steps based on OSI Model, what happens when you enter the address http://google.com in browser?? Summarize the complete steps based on layered OSI approach.

3 Answers   Cisco, Intel, TCS, Trimble Navigation,


What is a function of a reliable transport layer connection? A. route selection B. acknowledgements C. session checkpoints D. system authentication

2 Answers  


When we use loop back ip?

0 Answers  


Categories