Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the point-to-point protocol in ccna?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Do we subletting of ip?

0 Answers  


A ISDN BRI circuit can be described as a which of the following? A.) 3B channels B.) 2-64Kbps B channels and 1-16Kbps D channel C.) none of the above D.) 2-64Kbps B channels and 1-16Kbps C channel

1 Answers  


Do you found the Cisco Certification 642-067 exam Guide ?

1 Answers  


Hi Jitendera, I need ur suggestion. I completed my CCNA certification & also hving some sort of real time experience. Now i m planning to do CCNP. Little bit confusion is that whether it wud be better for me to go for CCNP ya CCNA (Security). As off my goal is to reach CCIE (Security & Switching/Routing). So tell me some solution of my confusion yaar..!!! Thanx & Regards Shahin..

1 Answers  


What does the term Base refer to in 100BaseT A. cabling type B. singnal type C. 100 mode type D. spectrum used E. speed category

3 Answers  


Identify the 3 key features of the Cisco Discovery Protocol? A.) Off by default B.) Will allow for the discovery of layer 3 addresses on neighbor routers C.) Verifies connectivity D.) Open standard E.) Does not require any layer 3 protocols to be configured

1 Answers  


What is mtu and what is its size for transmission?

0 Answers  


What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer

1 Answers  


What is the usage of service password encryption?

0 Answers  


what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how to block some site on that which form user not able to access site and basic firwall config and why are we using firwall please jittendra explain it.can u send me doc of firwall in my gmail id - dsoni89@gmail.com

6 Answers  


Which three protocols are correctly matched to their transport layer functions? (Choose three) A. route selection IP B. sliding window UDP C. well known pods IP D. route validation ICMP E. connection oriented TCP F. three-way handshake TCP G. no sequence and acknowledgement UDP

1 Answers  


CSMA/CD stand for which of the following? A.) Carrier Sense, Multiple Access with Collision Detection B.) Collision Sense, Multiple Access with Collision Detection C.) Collision Sense, Multiple Access with Carrier Detection D.) Carrier Sense, MAC address with Collision Detection

1 Answers  


Categories