When we use loop back ip?
No Answer is Posted For this Question
Be the First to Post Answer
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
What is the difference between named and extended acl?
- What is EGIRP and IGRP - How EGIRP and IGRP works
'Show cdp neighbors detail' show the following 3 pieces of information? A.) Hardware platform B.) Software version C.) Same as 'show version' command D.) Up to 1 address for each protocol E.) Non-direct connected routers
How arp brings mac address for switch?
What IP command would you use to test the entire IP stack? A.) Stack-test B.) Arp C.) Telnet D.) Ping E.) Trace
What is the default CDP broadcast update rate for Cisco routers? A.) 120 seconds B.) 60 seconds C.) 30 seconds D.) 90 seconds
How many access lists are allowed per interface? A. One per port, per protocol B. Two per port, per protocol C. Unlimited D. Router interface +1 per port.
What is the difference between static and dynamic ip addressing?
Identify 2 features of X.25? A.) Supports only IP B.) Utilizes switched and permanent virtual circuits C.) Contains minimal flow control and error recovery D.) Utilizes LAPB as it's data-link protocol
How many collisions are caused by transmitting and receiving frames simultaneously in a full-duplex Ethernet technology? A. one B. two C. none D. several
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.