Tell me how many reserve ports?
No Answer is Posted For this Question
Be the First to Post Answer
What is the Difference Between Windows 2003 And Windows 2008 Server?
Name the vtp modes?
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
IP RIP routing is conferred on a router but not all interfaces attach to RIP networks. What should you use to prevent all RIP routing updates from being sent through selecedc interfaces without using access lists? A. passive route B. default routes C. passive interface D. route update filtering
Which two types of route table entries are used by a Layer 3 router to determine the appropriate path to destination? (Choose two) A. static route entry B. default route entry C. Dynamic route entry D. temporary route entry E. permanent route entry
Which of the following is an example of the Network Layer? A.) TCP B.) IP C.) SQL D.) Token Ring E.) LLC
How many LMI types are available on Cisco routers? A.) Four B.) Two C.) Five D.) Three
Which of the following is True regarding passwords on a Cisco router? A. All passwords can be encrypted B. All passwords can be entered using the set-up dialogue C. A password can be set before a user can enter the privileged mode D. A password can be set for individual lines E. TACACS or Radius password authentication can be used.
what is router,bridges,hubs?
Each department has its own file server and the company has an enterprise server that is shared by all departments. What does a network administrator use to provide a secure separation between the management and sales departments? A. a bridge between management and sales B. routers to provide the most secure segmentation C. a hub to provide ease of management and a satisfactory alternative for network security D. an Ethernet switch to maintain secure separationthrough programming the access lists for each port of the switch
Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router router?
what is used for passive intercae comand mine answer-to prevent to take update from outside