Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


I am just getting into this,I want to jump ahead a do the
packet tracers in discovery working at a small to medium
business or ISP but I am trying to get the last lab putting
it all together. Does anyone have anything for this. I know
it is ahead of me but I would like to get this so I can look
at the beginning and understand it more

Answers were Sorted based on User's Feedback



I am just getting into this,I want to jump ahead a do the packet tracers in discovery working at a..

Answer / deepak baluni

Friend, First try to create an exact network diagram using
CDP(If all Cisco Devices are in your network).then check
the VLANS settings if any. then use Ping or tracert to
check the full connectivity. GNS can be used for simulation.

Is This Answer Correct ?    6 Yes 2 No

I am just getting into this,I want to jump ahead a do the packet tracers in discovery working at a..

Answer / ajab

Dear you can use GNS3

Is This Answer Correct ?    3 Yes 2 No

Post New Answer

More CCNA Interview Questions

What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.

1 Answers  


Which of the following is used to manage and monitor the network? A.) SNMP B.) HTTP C.) IP D.) FTP

4 Answers  


What is an example of a valid MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234.FEGA D. 00.00.12.34.FE.AA

14 Answers   Aricent,


What are packets?

0 Answers  


Which type of LAN segmentation device enables high speed data exchange? A. hub B. bridge C. switch D. repeater

3 Answers   Accenture, TCS,


Which OSI layer establishes, maintains and terminates sessions between hosts? A.) Application B.) Physical C.) Data-Link D.) Presentation E.) Network F.) Session

2 Answers  


If a router uses static routing, how does it learn the route to remote networks? The router uses a RIP request to obtain remote network numbers. The router uses a routing protocol to exchange remote network numbers. The router uses DNS request packets to obtain remote network numbers. The Network Administrator manually configures the remote networks.

1 Answers  


There is an emergency fall-back 'skeleton' IOS stored in read only memory on all Cisco routers. What command would make the router load the IOS from Read Only Memory? A.) reload rom B.) boot system rom C.) load ios bootflash D.) load ios rom E.) bootsystem skeleton

3 Answers  


Which of the following encapsulation types can be used on leased-line connections? (Choose two) &#10061; A. HDLC &#10061; B. Frame Relay &#10061; C. ISDN &#10061; D. PPP

10 Answers   Wipro,


what is the default ad value of the interface directly coneted to router. as for exmaple ad value of ospf is 90 then from ehternet the network is conected whta is difault value of that directly conected interface. what is the defalt ad value of bgp whta is access llist and how many type of access list what is vlan what is vpn how e congigure the router what is mpls these are the question skrd to me at tcs i have replyed all ecxept the first one

1 Answers   TCS,


What is a function of a reliable transport layer connection? A. route selection B. acknowledgements C. session checkpoints D. system authentication

2 Answers  


When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.

1 Answers  


Categories