Differentiate Logical Topology from Physical Topology
No Answer is Posted For this Question
Be the First to Post Answer
What are the different memories used in a CISCO router?
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
Identify the 2 commands that display the clock rate configured on the serial0 interface? A.) show serial0 B.) show interface serial0 C.) show clock rate serial 0 D.) show controllers serial 0 E.) show running-config
4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN
Which two statements accurately define IP addressing rules? (Choose two) A. IP multicast addresses start with 240 B. A host Carbon of all 1 a indicates a network broadcast C. The value of zero (0) in the host Carbon means all hosts on the network D. IP addresses are four octets long and contain a network Carbon and a host Carbon
Which of the following is an example of the Physical Layer? A.) TCP B.) ARP C.) IP D.) FDDI E.) LLC F.) Fast Ethernet
Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version
Which OSI layer establishes, maintains and terminates sessions between applications? A.) Application B.) Physical C.) Data-Link D.) Presentation E.) Network F.) Session
bWhich form of PPP error detection on Cisco routers monitors data dropped on a link? A. Quality B. Magic Number C. Error Monitor D. Droplink
What is the default switching method for the Cisco 5000 series? A.) Cut-through B.) Store-and-splice C.) Latency D.) Store-and-forward
Completely describe the steps based on OSI Model, what happens when you enter the address http://google.com in browser?? Summarize the complete steps based on layered OSI approach.
3 Answers Cisco, Intel, TCS, Trimble Navigation,
You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? A. 10101100 00010000 B. 00000010 10100000 C. 10101100 00000000 D. 11100000 11110000