How many reserve ports?
No Answer is Posted For this Question
Be the First to Post Answer
What is the purpose of a data link?
Which two of the following protocols are used at the Transport layer? A.) ARP B.) UDP C.) ICMP D.) RARP E.) TCP F.) BootP
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
Why ip address called logical address?
Identify the following components of the IPX address 2e.0000.0065.ed43 A.) Not a valid IPX address B.) Network = 2e, Subnet = 0000, Node = 0065.ed43 C.) Network = 2e.0000, Node = 0065.ed43 D.) Network = 2e, Node = 0000.0065.ed43
Which three statements about common elements of the TCP/IP protocol stack are true? (Choose three) A. IP provides connectionless service and routing capabilities B. APP enables devices to locate the IP address of local devices C. UDP provides simple connectionless service without windowing or acknowledgments D. ICMP provides connection oriented management data to routers and Layer 3 switches E. TCP enables devices to send large quantities of data using windowing in a connection oriented manner
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
Which 3 statements describe default encapsulation and LMI type configuration? A.) There are only 4 encapsulations and 3 LMI type options B.) The LMI type config term options C.) In release 11.2 the LMI type is autosensed D.) The default LMI is Cisco E.) IETF encapsulation must be configured unless the connecting routers are both Cisco
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
What is the beaconing?
What is the regional telco office called, where the customers local loop terminates? A.) Demarc B.) DTE C.) DCE D.) CO E.) CPE
what is the difference between a ‘half-duplex’ and a ‘full-duplex’ system?