I am just getting into this,I want to jump ahead a do the
packet tracers in discovery working at a small to medium
business or ISP but I am trying to get the last lab putting
it all together. Does anyone have anything for this. I know
it is ahead of me but I would like to get this so I can look
at the beginning and understand it more
Answers were Sorted based on User's Feedback
Answer / deepak baluni
Friend, First try to create an exact network diagram using
CDP(If all Cisco Devices are in your network).then check
the VLANS settings if any. then use Ping or tracert to
check the full connectivity. GNS can be used for simulation.
| Is This Answer Correct ? | 6 Yes | 2 No |
What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.
Which of the following is used to manage and monitor the network? A.) SNMP B.) HTTP C.) IP D.) FTP
What is an example of a valid MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234.FEGA D. 00.00.12.34.FE.AA
What are packets?
Which type of LAN segmentation device enables high speed data exchange? A. hub B. bridge C. switch D. repeater
Which OSI layer establishes, maintains and terminates sessions between hosts? A.) Application B.) Physical C.) Data-Link D.) Presentation E.) Network F.) Session
If a router uses static routing, how does it learn the route to remote networks? The router uses a RIP request to obtain remote network numbers. The router uses a routing protocol to exchange remote network numbers. The router uses DNS request packets to obtain remote network numbers. The Network Administrator manually configures the remote networks.
There is an emergency fall-back 'skeleton' IOS stored in read only memory on all Cisco routers. What command would make the router load the IOS from Read Only Memory? A.) reload rom B.) boot system rom C.) load ios bootflash D.) load ios rom E.) bootsystem skeleton
Which of the following encapsulation types can be used on leased-line connections? (Choose two) ❍ A. HDLC ❍ B. Frame Relay ❍ C. ISDN ❍ D. PPP
what is the default ad value of the interface directly coneted to router. as for exmaple ad value of ospf is 90 then from ehternet the network is conected whta is difault value of that directly conected interface. what is the defalt ad value of bgp whta is access llist and how many type of access list what is vlan what is vpn how e congigure the router what is mpls these are the question skrd to me at tcs i have replyed all ecxept the first one
What is a function of a reliable transport layer connection? A. route selection B. acknowledgements C. session checkpoints D. system authentication
When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.