Suppose we are having two Switches i.e. Switch1 & Switch2
Port1 of Switch1 is Connected to Uplink and switch2 is also
connected to switch1? So
1>Is there is any loop?
2>How we come to know that there is a loop created?
3>If we add Switch3 to switch2 then there is a possibility
of loop Creation?
No Answer is Posted For this Question
Be the First to Post Answer
bWhich form of PPP error detection on Cisco routers monitors data dropped on a link? A. Quality B. Magic Number C. Error Monitor D. Droplink
Which of the following are characteristics of UDP? A.) UDP is connection oriented. B.) UDP is used with TFTP. C.) UDP is unreliable. D.) UDP is connectionless. E.) UDP is at the transport layer. F.) UDP uses no acknowledgements.
What are four benefits that can result from applying ISDN networking? (Choose four) A. Full time connectivity across the ISDN is spoofed by Cisco IOS routers using dial on demand routing (DDR) B. Small Once and Home Once sites can be economically supported with ISDN Basic Rate Interface (BRI) servkps C. ISDN replaces Signaling System 7 (SS7) in the Public Switched Telephone Network (PSTIC) backbone D. ISDN can be used as a backup service for a leased line connection between the remote and central chaps E. Modem racking and cabling can be eliminated by integration of digital modem cards on Cisco IOS Network Acess Servers (NAS)
What is the difference between ‘bit rate’ and ‘baud rate’?
What is the default LMI type? A.) Cisco B.) ANSI C.) IETF D.) Q933a
What does -1 mean in an extended IPX access-list? A.) Any IP address B.) Deny all C.) Deny host D.) Any host or any network
What is masking? why is needed?
what are the different symmetric algorithms?
What is the default LMI type for Cisco Routers that are using Frame-Relay? A.) Gandalf5 B.) Q933A C.) Cisco D.) IETF E.) ARPA F.) SAP
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.
How do you find the parameters that you can use with the SHOW command? A.) ? show B.) show ? C.) debug show D.) help E.) sh?
Cisco's implementation of ISDN BRI has multi protocol support, SNMP MIB support, and what other features? A.) Call waiting B.) Compression C.) ADSL D.) 1.544 Mbps E.) Call screening F.) Negative 'G' support