How do we do encryption and authentication in L2F?
No Answer is Posted For this Question
Be the First to Post Answer
What is the result of segmenting a network with a router into segments 1 and 2? A. It increases the number of collisions B. It decreases the number of broadcast domains C. It connects segment 1 and broadcasts to segment 2 D. It connects segment 1 and broadcasts from genre to segment 2
Identify the command to disable CDP on an interface? A.) Router(config-if)# no cdp enable B.) Router(config-if)# no cdp run C.) Router# no cdp enable D.) Router(config-if)# no cdp
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer
i want to ask one question that why u guys are not posting the questions is any thing wrong please post question for your and others including me knowledge
Which two commands allow you to verify address configuration in your unternetword? (Choose two) A. ping B. trace C. verify D. test ip E. Echo ip F. config ip
What is ‘round-trip time’?
Which ISDN protocol prefix specifies switching and signalling? A.) I B.) E C.) Q D.) S
How many collisions are caused by transmitting and receiving frames simultaneously in a full-duplex Ethernet technology? A. one B. two C. none D. several
Is hub intelligent device?
What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.
What is the Between Normal Switch and Manageable Switch?
while trouble shooting a network conectivty prob a technician observes that steady link light on the both work stations nic and the switch port which the workstation is conected.however when the ping comand is issuede from the work station the out message is request time out at which layer of osi model does the prob most likly exist 1 sessiom layer protocol layer datalink kayer acess layer network layer application layer i have ansered n/w layer but i am niot sure i have also posted privous question jitendera kumar sinha