Differentiate Logical Topology from Physical Topology


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM

2 Answers  


What is wide-mouth frog?

4 Answers   Wipro,


What hppends when ping 127.0.0.1 command executes?

10 Answers   CMS, Wipro,


Which command line option will determine what traffic is interesting enough to establish a dialup connection? A.) dialer map B.) dialer string C.) dialer in-band D.) dialer-list E.) dialer negotiation

1 Answers  


What are four functions/characteristics of the network layer of the OSI model? (Choose four) A. It uses a two-part address B. It maintains routing tables C. It uses broadcast addresses D. It establishes network addresses E. It provides access to the LAN media F. It provides media independence for upper layers G. It provides path selection for Internetwork communication

1 Answers  






1. What is an advantage to LAN segmentation? A. Provides multiprotocol support B. Decreases security C. Decreases broadcasts D. Increases broadcasts

2 Answers  


Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, that network is advertised with an infinite metric

1 Answers  


What is the name of distance vector algorithm?

0 Answers  


An user from the LAN is able to ping the default gateway of the router and other sites in the internet. but not able to ping only the google site, no acc list configured and no firewall and no problem with DNS atall. What may be the problem with router?

8 Answers   Satyam,


What are the two types of access lists that can be configured on a Cisco router? A. Standard B. Extended C. Filtering D. Packet

2 Answers  


Which feature should a routing protocol have to support vlsm?

0 Answers  


Why Authentication Header (AH) is not compatible with the network that using NAT?????? Jitu, looking for u specially...!!!! U knw why i m looking for u..!!!

1 Answers  


Categories