What are the different types of passwords used in securing a CISCO router?
No Answer is Posted For this Question
Be the First to Post Answer
Which of the following would not be displayed by the command ?sho cdp neighbor detail?? A.) The incoming/outgoing interface. B.) The hardware platform. C.) One address per protocol. D.) Amount of Flash Memory Available E.) The routers hostname. F.) The subnet mask, if IP is configured.
A default route is analogous to a _________. A. default gateway B. static route C. dynamic route D. one-way route
Which of the following is an example of the Network Layer? A.) TCP B.) IP C.) SQL D.) Token Ring E.) LLC
what are loops in switches excactly...and how does it gets created???
Which two of the following are valid ways to have multiple encapsulation types on a single interface? A.) This is not possible B.) subinterfaces C.) additional physical interfaces D.) secondary addresses
What is cam?
Identify the hardware component used to store buffers, tables, running-configuration etc? A.) NVRAM B.) ROM C.) RAM D.) Flash
What command displays detail information about the OSPF interfaces, including the authentication method?
Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM
A big part of the overhead on a network is broadcasts. You divide a large number of hosts into smaller individual networks and separate them with the proper device According to proper networking terminology you have created separate _______________________, User Domains Broadcast Domains Collision Areas Broadcast Areas
PLACE YOURS QUESTION HERE I ALSWYS BE HERE FROM 9 AM TO 6PM SO U CAN FIND YOUR ANSWER QUICKLY.IF I KNOW THEN ? JJIITTEENNDDEERRAA SSIINNHHAA
Can anyone explain the Split Horizon rule in RIP & also Split Horizon with Poison reverse. Jitu.... U knw wat i expect.. hehehehehe...