What are the two types of transmission technology use in ccna?
No Answer is Posted For this Question
Be the First to Post Answer
As a system administrator, you need to provide your routers with a Domain Name System (DNS) server. How many DNS servers can you specify with one command? A. 6 B. 1 C. 2 D. 4
Which three statements about common elements of the TCP/IP protocol stack are true? (Choose three) A. IP provides connectionless service and routing capabilities B. APP enables devices to locate the IP address of local devices C. UDP provides simple connectionless service without windowing or acknowledgments D. ICMP provides connection oriented management data to routers and Layer 3 switches E. TCP enables devices to send large quantities of data using windowing in a connection oriented manner
i want to get my ccna certificate?how?my certificate can not reach to m?
LAN stands for which of the following? A.) Local Area Network B.) Local Arena Network C.) Local Area News D.) Logical Area Network
Identify the 3 kinds of routes IGRP advertises? A.) Interior B.) Dynamic C.) System D.) Exterior
Which of the following are valid Cisco encapsulation type names? A.) arpa = IPX Ethernet B.) novell-ether = IPX Ethernet_802.3 C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring D.) novell-fddi = IPX Fddi_Raw E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring F.) hdlc = HDLC on serial interfaces
Company XYZ has an employee that works out of the home. The employee runs big client server applications and must quickly transfer large files. The company wants the best cost/benefit on this connection. What would be the most practical solution? A. an ISDN Basic Rate Interface (BRI) connection to the user at home B. a dedicated T1 connection to the user at home C. a dedicated Frame Relay connection to the user at home D. a standard 28.8 analog dialup connection to the user at home
Explain the difference between switch & hub?
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards
what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?
Given the following IP address from the Class B address range 172.35.21.12. Your network plan requires no more than 126 hosts on a shored. Which value should you use as the subnet mask? A. 255.255.0.0 B. 255.255.128.0 C. 255.255.126.0 D. 255.255.255.128 E. 255.255.255.252