Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the difference between communication and transmission?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Identify 3 features of IGRP? A.) Composite metric B.) New horizon C.) Flash (triggered) updates D.) 60-second periodic updates E.) Poison reverse

1 Answers  


Guys Please send me or suggest me any link for all interview question and answer on CCNA asked in TECH MAHINDRA. I have only 4-5 days for preparation. my mail id is nikhil9823@gmail.com

1 Answers   IIHT,


Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol

2 Answers  


What is the size of an ip address?

0 Answers  


What is the function of the Transport layer and which protocols reside there? A.) MAC addressing - IP B.) Interhost communication - SQL, NFS C.) Best effort Packet delivery - TCP, UDP D.) End-to-end connections - TCP, UDP

2 Answers  


How broadcast is created in switch

1 Answers  


If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2

1 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


What are the IGRP stability features?

1 Answers  


Which of the following are Distance Vector protocols? A.) IGRP B.) RIP C.) OSFP D.) EIGRP

3 Answers  


how can we block remote desktop for some user from cisco router through aaccess-list

5 Answers  


What is ping utility?

0 Answers  


Categories