Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are 10base2, 10base5 and 10baset ethernet lans?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Explain the difference between baseband and broadband transmission in ccna?

0 Answers  


What is the diiffernce between windows xp & windows 2000?

6 Answers   TCS, Trimax, Trymax, VigaTech,


Which IEEE standard is used to define Wi-Fi? A. IEEE 802.3 B. IEEE 802.5 C. IEEE 802.11h D. IEEE 802.11c E. IEEE 802.11

13 Answers   Infosys,


Which of the following are examples of the Session Layer? A.) TCP B.) RPC C.) SQL D.) NFS E.) Token Ring

1 Answers  


Identify the following command to configure a secret password to 'cisco'? A.) Router(config)#enable password cisco secret B.) Router(config)#enable secret cisco C.) Router(config)#enable secret password cisco D.) Router(config)#set secret = cisco

1 Answers  


how we can creat VPN..??? how it can be configured on cisco switches..??? can we creat VPN on different networks..??? why we need to create VPN..??? kindly write complete activity of commands to configure a VPN on switch..??? me specially looking towards Jatendra and Shahin

1 Answers  


Can you explain tunneling?

0 Answers   CCIE,


what is the distance betwwen link stae routing protocl and distance vector who have the best convergence toplogy eigrp conatain 3 table name them what the toplogy table contain

5 Answers   IBM,


What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic

1 Answers  


On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this channel? A.) 64 Kbps B.) 1.544 Mbps C.) 128 Kbps D.) 2.048 Mbps E.) 16 Kbps

4 Answers  


What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS

2 Answers  


What is CRC and which layer it use?

4 Answers   CMS,


Categories