How many types of ips?
No Answer is Posted For this Question
Be the First to Post Answer
What is cam?
Explain why ip address called logical address?
From Enable mode, a user types the letter 'C' and presses enter. There is more than 1 command that starts with 'C'. What message would the router return? A.) Nothing would be returned, the command is simply ignored. B.) unknown command C.) ambiguous command. D.) Copy to? E.) Configured console from console.
Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connnections D.) Path selection E.) MAC address examination F.) Network monitoring
Identify the command to display all the valid commands at the given mode? A.) Help all B.) Help C.) All commands D.) ?
Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols
1-what is the diffrence between hdlc and ppp protocol 2- why frame realy technogy called NBMA
What key do you use to view the last command? A.) Left Arrow B.) Ctrl-P C.) Up Arrow D.) Right Arrow
Given the following IP address from the Class C address range 192.168.21.12. Your network plan needs addresses for 28 small prkps Each office uses its own shored. The network design specifies that you confound for five bits of subnetting. When you confound for this in Cisco IOS software which shored mask should you use? A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248 E. 255.255.255.252
how to find network ID from IP address?without using network calc...
12 Answers Idea, Karbon, NIIT,
What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic
What are the different types of passwords used in securing a CISCO router?