Name the different types of networks
No Answer is Posted For this Question
Be the First to Post Answer
Can you explain the basic of encryption in VPN?
In regards to the ISDN BRI standard, which channel is used for control? A.) B B.) D C.) E D.) I E.) Q
Assume that you are editing a line of text on a Cisco router. What key-stroke combination would take you to the beginning of the line? A.) CTRL-B B.) CTRL-Z C.) CTRL- D.) CTRL-A E.) CTRL- F.) CTRL-
There are two processes to pair MAC address with IP addresses. Which process finds an IP address from a MAC address? A. RARP B. ARP C. RIP D. IGRP
What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging
How many access lists are allowed per interface? A. One per port, per protocol B. Two per port, per protocol C. Unlimited D. Router interface +1 per port.
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
What does -1 signify in an extended IPX access list? A. permit this host B. deny this host C. permit only this subnet D. any host or any network
Which protocol resolves an IP address to a MAC address? A.) DHCP B.) RARP C.) ARP D.) NBP E.) DNS
Tell me how many reserve ports?
Which EXEC command displays system hardwarde configuration information software version and the names and sources of configuration files and boot images on a router? A. show boot B. show flash C. show config D. show version
What is the default behavior of access-list?