Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which protocols do periodically updates?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Which of the following are ways to provide login access to a router? A.) HTTP B.) Console C.) Telnet D.) Aux Port E.) SNMP F.) LLC

3 Answers  


Identify 3 IP applications? A.) AURP B.) ARP C.) Telnet D.) SMTP E.) DNS F.) RARP

2 Answers  


what is router?

9 Answers   IBM,


Which configuration mode and command combination sets the bandwidth metric of a Frame Relay connection? A. router(config)# clock rate 56 B. router(config)# bandwidth 56 C. router(config)# bandwidth 56000 D. router(config)# clock rate 56000

2 Answers  


Which two commands allow you to verify address configuration in your unternetword? (Choose two) A. ping B. trace C. verify D. test ip E. Echo ip F. config ip

2 Answers  


What does the IPX maximum-path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)

1 Answers  


What is the point-to-point protocol in ccna?

0 Answers  


IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port

3 Answers  


what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?

1 Answers  


Which statement about an IP network is true? A. A broadcast source MAC address contains all zeros B. A MAC address is part of the physical layer of the OSI model C. MAC addresses are used by bridges to make forwarding decisions. IP address are used by routers. D. IP addresses allow a flat addressing scheme. MAC addresses use a hierarchical addressing scheme.

2 Answers  


Which type of switching reads just the address portion of the frame and then immediately starts forwarding it? A.) Cut-Through B.) Store-and-Forward C.) Tabling D.) Routing E.) Inverse ARP F.) Fast Forward

1 Answers  


Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, the router enters in its table the number 16 to signify destination unreachable

1 Answers   Google,


Categories