What is the checksum?
No Answer is Posted For this Question
Be the First to Post Answer
Which global configuration command will tell the router to load the IOS file 'IOS_filename' from the Network File server at 1.2.3.4 during the next boot? A.) boot system flash IOS_filename 1.2.3.4 B.) boot system tftp IOS_filename 1.2.3.4 C.) config-register 0x0 1.2.3.4 D.) boot system rom 1.2.3.4 E.) This can not be done, only the first file in flash can be used.
What is matric?
When discussing static routes, what is the gateway parameter used for? A.) Determining the dynamic route B.) Defining the subnet C.) Defining the Administrative Distance D.) Determining the next hop
What's the default CDP holdtime in seconds for Cisco routers? A.) 30 seconds B.) 180 seconds C.) 90 seconds D.) 60 seconds
7. What is an advantage to using switches in your network? A. Addressing of hosts by DHCP B. Ease of administration C. Stops broadcast storms D. Works like a repeater
I have one problem in my network my windows xp pc in workgroup there r 2 NIC card one I have disable in and second is active. The problem is in a day some time its ip conflict with other and when I see the event log and get the conflict ip mac and scan it with LAN scanner on one is there for that mac address nic in my network I have disable dhcp also don’t know what is the problem
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance
12 Answers EF, IBM, jetking, Nexlinx, Rkd, TCS, Wipro,
Identify 2 features of PPP CHAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) Less secure then PAP D.) Local router 'challenges' the remote router
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
what is the difference between eigrp and ospf
Which command will display adjacent routers found by the Cisco Discovery Protocol? A.) show all B.) show cdp entry C.) show ip neighbors D.) show cdp neighbor detail E.) show cdp neighbor F.) show neighbor