What is the difference between unicast, multicast, broadcast, and anycast?
No Answer is Posted For this Question
Be the First to Post Answer
Identify the command to configure the router to boot from an alternate IOS located in flash? A.) boot system flash IOS.exe B.) boot system tftp IOS.exe 172.16.5.1 C.) boot system alternate IOS.exe D.) boot system rom IOS.exe
What layer can optionally support reliability? A.) Transport B.) IP C.) Physical D.) Network E.) Sub-physical layer
What is subnetting? Why is it used?
Tell me which cable called roll-over?
Which Distance Vector characteristic can help to speed up convergence? A.) Triggered Updates. B.) Split Horizon. C.) Poison Reverse. D.) Hold Down timers. E.) Inverse ARP.
Identify the 3 characteristics of IGRP? A.) Uses hop count as a metric B.) Supports multiple unequal paths C.) Administrative distance is 100 D.) Configured with an Autonomous system number E.) Link state
Differentiate Logical Topology from Physical Topology
What does -1 mean in an extended IPX access-list? A.) Any IP address B.) Deny all C.) Deny host D.) Any host or any network
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.
Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon
You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0
Identify the order of the 5 step encapsulation? 1) Create the segment 2) Convert the frame to bits 3) Create the packet 4) Create the frame 5) User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2