What is difference between flsm and vlsm?
No Answer is Posted For this Question
Be the First to Post Answer
What are the 3 ways routers learn paths to destination networks? A.) Dynamic B.) Static C.) Routing tables D.) Default
Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? A. Identification B. Flags C. Frag Offset D. Type of Service E. Total Length
Which command will start the process for a Cisco IOS file image upgrade? A.) download B.) copy tftp flash C.) copy flash tftp D.) download flash E.) network
When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.
I am just getting into this,I want to jump ahead a do the packet tracers in discovery working at a small to medium business or ISP but I am trying to get the last lab putting it all together. Does anyone have anything for this. I know it is ahead of me but I would like to get this so I can look at the beginning and understand it more
Which layer is responsible for routing through an internetwork? A.) Physical B.) Session C.) Network D.) Transport E.) Application F.) Data Link
bWhich form of PPP error detection on Cisco routers monitors data dropped on a link? A. Quality B. Magic Number C. Error Monitor D. Droplink
what is ip address and what is the difference between the ip address and mac address why we are not using mac address instead of ip address
1) How a router established a neighbor relation ship in ospf
In port based access-list which command u give instead of ip?
what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?
The maximum distance on a 10BaseT network from the hub to a workstation is which of the following? A.) 500 meters B.) 1000 meters C.) 100 meters D.) 1500 meters