What are the things that can be accessed in a CISCO router’s identifying information?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Which of the following provide correct information about a protocol at the transport layer of the OSI model? A.) UDP - Provides Connectionless datagrams service B.) TCP - Provides Connection Oriented Services C.) SMTP - Provides Mail Exchange D.) IP - Route determination E.) TCP - Provides Flow Control and Error Checking F.) FTP - Transfers of Files

1 Answers  


Which network mask should you place on a Class C network to accommodate a user requirement of ten subnetworks? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248

7 Answers  


When you type google.com what are the process involved from layer 7-layer1?

3 Answers   Cisco, IIHT,


Identify the purpose of the following command 'ip route 192.168.100.0 255.255.255.0 10.1.0.1' A.) Enabling a dynamic routing protocol B.) Creating a static route to the 10.1.0.0 network C.) Teaches the router about the distant network 192.168.100.0 and how it can be reached via 10.1.0.1 D.) Assigining the IP address 192.168.100.0 to an interface

2 Answers  


Layer 1 and Layer 2 devices must forward a broadcast. Which of the following devices fall into this category? Gateway Switch Router All of the above.

1 Answers   Sutherland,






What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer

1 Answers  


When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.

1 Answers  


Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connections D.) Path selection E.) MAC address examination F.) Network monitoring

2 Answers  


CPE is an acronym for which of the following? A.) Customer Premise Equipment B.) Central Processing Engineering C.) Customer Process Equipment D.) Central Processing Equipment

1 Answers  


Does switch has the IP Address. If YES? How to find it?

7 Answers   Wipro,


Identify the 2 commands to copy a configuration from a TFTP server to RAM? A.) configure network B.) configure overwrite C.) copy backup-config running-config D.) copy tftp running-config

1 Answers  


hi all.. can any one explain the complete topology of stp and rstp how it works . root swtch connects to a root port and then root port conenct to other switchs designated port. i was going thru his site http://www.cisco.com/en/US/tech/tk389/tk621/technologies_whi te_paper09186a0080094cfa.shtml in which DR also exist on root switch only which makes my understanding grim.I had a diff notion of stp all together. please post asap. and if possible refer a url so thst i can read it my self .. thanks

1 Answers  


Categories