Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


How many collision domains are in switch?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Which statement is true when a broadcast is sent in an Ethernet/802.3 ITAN? A. The ip shored used is 255.255.255.0 B. The IP address used is 255.255.255.255 C. The MAC address used is 00 00 00 00 00 00 D. The MAC address used is FF FF FF FF FF FF

1 Answers  


Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, the router enters in its table the number 16 to signify destination unreachable

1 Answers   Google,


Of the following characteristics, which apply to UDP? Connection-oriented Connectionless Error checking Low overhead Best-effort delivery

5 Answers  


Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) RPC

2 Answers  


What is the default routing metric used by IGRP? A.) MTU, delay, bandwidth, reliability, and loading B.) Count to infinity C.) Bandwidth and delay D.) Hop count

2 Answers  


Identify the 2 hardware components used to manage and/or configure a router? A.) Auxiliary port B.) ROM port C.) Management port D.) Console port

1 Answers  


What are the different types of password used in securing a cisco router?

0 Answers  


Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay

1 Answers  


Which of the following can reply to a Novell Get Nearest Server (GNS) request? A.) Local Novell server B.) Remote Novell Printer C.) Cisco router D.) Novell client

1 Answers  


What is mac address size of ipv6?

0 Answers  


Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25

1 Answers  


An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.

1 Answers  


Categories