Mention what is dhcp?
No Answer is Posted For this Question
Be the First to Post Answer
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion
On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this channel? A.) 64 Kbps B.) 1.544 Mbps C.) 128 Kbps D.) 2.048 Mbps E.) 16 Kbps
What is the purpose of Split Horizon? A.) It prevents the regular update messages from reinstating a route that has gone down B.) Information received on an interface cannot be sent back out the same interface C.) Informs all neighbor routers that two routes exist D.) Tells the router the destination is unreachable
Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply
Define load balancing?
How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A. 4 B. 30 C. 60 D. 62 E. 112 F. 124
10. Which STP state populates the MAC address table but doesn't forward data frames? A. Blocking B. Listening C. Learning D. Forwarding
Which of the following is an example of the Physical Layer? A.) TCP B.) ARP C.) IP D.) FDDI E.) LLC F.) Fast Ethernet
Switching methods include cut-through, store and forward, and a modified version of the first two methods. Which statement about switching methods is true? A. The store and forward method has low latency B. The cut through method of switching has high latency C. The modified version holds the packet in memory until 50 percent of the packet reaches the switch D. The modified version holds the packet in memory until the data spoon of the packet reaches the switch
Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM
Which network mask should you place on a Class C address to accommodate a user requirement of two subnetworks with a maxximum of 35 hosts on each networks A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248
What are the different types of passwords used in securing a CISCO router?