What are the different types of the password used in securing a cisco router?
No Answer is Posted For this Question
Be the First to Post Answer
Explain the difference between igp and eigrp?
Which NetWare protocol works on layer 3--network layer--of the OSI model? A. IPX B. NCP C. SPX D. NetBIOS
What is the result of using a hierarchical addressing framework? A. increased availability of addresses B. decreased distance between routers C. increased router memory requirements D. no need to maintain routing information
What is the function of the Transport layer and which protocols reside there? A.) MAC addressing - IP B.) Interhost communication - SQL, NFS C.) Best effort Packet delivery - TCP, UDP D.) End-to-end connections - TCP, UDP
Identify the number range for IPX SAP filters? A.) 900 - 999 B.) 1000 - 1099 C.) 800 -899 D.) 100 - 199
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
Which command will display adjacent routers found by the Cisco Discovery Protocol? A.) show all B.) show cdp entry C.) show ip neighbors D.) show cdp neighbor detail E.) show cdp neighbor F.) show neighbor
Tell me how many fillers we can put in one ip of ipv6?
Which is not a common problem with Distance-Vector routing? A.) Slow convergence. B.) Complex configuration. C.) Routing loops. D.) Periodic updates can slow convergence. E.) Counting to infinity.
At which layer of the OSI Reference Model do bridges operate? A.) Physcial B.) Session C.) Datalink D.) Transport E.) Network
What is trigger rip and from which ios version it starts?
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address