On which mode we give debug command?
No Answer is Posted For this Question
Be the First to Post Answer
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
Which two does 100BaseT use? A.) CSMA/CD B.) IEEE 802.5 C.) 802.3u D.) Switching with 53-byte cells
what is the reason for creating vlans
What is the key advantage of using switches?
What is the difference between simple authentication and md5?
When determining whether or not to route a LAN segment, which rule of thumb do you use? A.) 60/40 B.) 50/50 C.) 80/20 D.) 90/10 E.) 70/30
What are the two most common transport layer protocols? UDP TCP IPX ARP
Which statement is true? A. While bridges are used to segment networks, they will not isolate broadcast or multicast packets. B. A bridge looks at every packet within its network segment and works like a hub re-broadcasting the packet if the destination is within its network segment. C. A bridge maintains a table of the IP addresses of the hosts within its network segment and forwards the packet directly to the destination based upon the IP address. D. A bridge resets the hop count by keeping all packets within the network segment. Only packets addressed to a specific destination host outside the network segment are allowed to pass through the bridge.
What is the default LMI type? A.) Cisco B.) ANSI C.) IETF D.) Q933a
What are the different types of the password used in securing a cisco router?
Which statement is true when a broadcast is sent in an Ethernet/802.3 ITAN? A. The ip shored used is 255.255.255.0 B. The IP address used is 255.255.255.255 C. The MAC address used is 00 00 00 00 00 00 D. The MAC address used is FF FF FF FF FF FF
PLACE YOURS QUESTION HERE I ALSWYS BE HERE FROM 9 AM TO 6PM SO U CAN FIND YOUR ANSWER QUICKLY.IF I KNOW THEN ? JJIITTEENNDDEERRAA SSIINNHHAA