What is the difference between full duplex and half duplex?
No Answer is Posted For this Question
Be the First to Post Answer
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
Utilizing RIP, what is the limit when it comes to the number of hops?
The administrator of a comapny needs to ensure that a web server in their network is accessible from the Internet. Since the network uses private addressing, this requires an IP-to-registered-address mapping. The following command is entered on the router: router(config)# ip nat inside source static 192.168.2.1 198.18.1.254 After unsuccessful results from a ping to the Internet, the administrator issues the show ip nat translations command and the output is blank. What could be the problem with the NAT configuration for this mapping? A. The keyword overload is missing from the command. B. The administrator needs to define a NAT pool first. C. An access list must be defined to create static NAT translations. D. The interfaces need to be configured for NAT.
What is the default size of a standard ping on a Cisco router? * A: 100 bytes * B: 32 bytes * C: 10 bytes * D: 16 bytes
Identify 2 features of PPP CHAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) Less secure then PAP D.) Local router 'challenges' the remote router
When you mistakenly type the wrong command at the Router# prompt the router does a DNS lookup which takes about 20 seconds. Which command can you enter to prevent the router doing this in future?
Define network congestion?
"arpa" is used by the Cisco IOS for which encapsulation types? A. Ethernet_II B. Ethernet_802.3 C. Ethernet_802.2 D. Ethernet_SNAP
Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router?
Which is the protocol using multiple tcp/ip connections? SLIP or PPP
Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) Ping D.) Console E.) Trace
Can you explain the broader steps of how L2F establishes the tunnel?