Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the size of hello packets in eigrep protocol?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Difference between routed and routing protocols not difference between protocol between those.

3 Answers   HCL, TCS,


What is the beaconing?

0 Answers  


Identify 3 features of IGRP? A.) Composite metric B.) New horizon C.) Flash updates D.) 60 periodic updates E.) Poison reverse

1 Answers  


What is the checksum?

0 Answers  


An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.

1 Answers  


What are the types of communication in ipv6 ?

0 Answers  


Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments

1 Answers  


Write out a config to permit only the below MAC address to pass traffic through a port on your switch. in another way writhe a confrigation which permit only mac address trfaic through a port of your switch

3 Answers  


What is 10base5 ethernet lans?

0 Answers  


why we assingn the wild card mask in the use of ospf and access list.

6 Answers   IBM,


Which of the following are Presentation Layer standards? A.) JPEG and PICT B.) MPEG and MIDI C.) ASCII and EBCDIC D.) NFS and SQL

2 Answers  


When dr communicate with bdr which multicast ip it use?

0 Answers  


Categories