Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What are the steps of data encapsulation?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

What is CIDR?

6 Answers   Wipro,


What not a name of an ISP? A. MSN B. Comcast C. Verizon D. McDonalds

2 Answers  


Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it

1 Answers  


Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward

1 Answers  


Which protocol can do load balancing on unequal cost also?

0 Answers  


Explain usage of ICMP in IP routing

3 Answers  


What will happen in OSPF, While a new highet priority DR joining in already running area.That area already having DR and BDR.

2 Answers   HCL,


What is a disadvantage of using a connection oriented protocal such as TCP? A. Packet acknowledgement may add overhead B. packets are not tagged with sequence numbers C. Loss or duplication of data packets is more likely to occur D. The application layer must assume responsibility for correct searchers of the data packets

1 Answers  


why we assingn the wild card mask in the use of ospf and access list.

6 Answers   IBM,


What is ping used for?

0 Answers  


Assuming no subnetting, which two pieces of information can be derived from the IP address 144.132.25.10? (Choose two) A. It is a Class C address B. It is a Class B address C. The network address is 144.0.0.0 D. The network address is 144.132.25.0 E. The host spoon of the address is 25.10

2 Answers  


How many ways to access router?

0 Answers  


Categories