What is the multicast routing?
No Answer is Posted For this Question
Be the First to Post Answer
Which two of the following protocols are used at the Transport layer? A.) ARP B.) UDP C.) ICMP D.) RARP E.) TCP F.) BootP
Which company mange api's?
Which routing protocols uses connection-oriented routing updates? A.) IGRP B.) UDP C.) RIP D.) IP E.) BGP
What is the regional Telco office called, where the customers local loop terminates? A.) Demarc B.) DTE C.) DCE D.) CO E.) CPE
Which two statements accurately define IP addressing rules? (Choose two) A. IP multicast addresses start with 240 B. A host Carbon of all 1 a indicates a network broadcast C. The value of zero (0) in the host Carbon means all hosts on the network D. IP addresses are four octets long and contain a network Carbon and a host Carbon
Which two types of route table entries are used by a Layer 3 router to determine the appropriate path to destination? (Choose two) A. static route entry B. default route entry C. Dynamic route entry D. temporary route entry E. permanent route entry
Which protocol is used for booting diskless workstations? A.) IP B.) ARP C.) RARP D.) TCP E.) SNMP
Given the following IP address from the Class C address range 192.168.21.12. Your network plan needs addresses for 28 small prkps Each office uses its own shored. The network design specifies that you confound for five bits of subnetting. When you confound for this in Cisco IOS software which shored mask should you use? A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248 E. 255.255.255.252
What is the attenuation?
which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance
Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connnection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding
What are the three phases of PPP session establishment? A. Link establishment phase B. Authentication phase C. Network layer protocol phase D. Handshake phase E. Dial-in phase