Tell me when we use standard access-list?
No Answer is Posted For this Question
Be the First to Post Answer
Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination
What is an example of a valid MAC address? A. 192.201.63.251 B. 19-22-01-63-25 C. 0000.1234.FEGA D. 00.00.12.34.FE.AA
What is the difference between dynamic ip and static ip addressing?
Which statements are true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not at the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth
What is the Function of Layer3 Switch?
Ping uses which Internet layer protocol? A.) RARP B.) ICMP C.) ARP D.) FTP
Which router command allows you to view the entire contents of all access lists? A. Router# show interface B. Router> show ip interface C. Router# show access-list D. Router> show all access-list
Identify IPX GNS and it's purpose? A.) Go Network Server - sends a print job to a network server B.) Get Nearest Server - locate the nearest server C.) Guaranteed Network Services - allocates resources to users D.) Get Notes Server - locates Domino Server
The default routing protocol for IPX is IPX RIP. How do you view the routing updates sent and received by the router? A.) debug ipx routing B.) debug ipx routing activity C.) debug rip D.) show ipx routing E.) sh ipx F.) debug ipx rip
What is a L2F protocol?
What is a disadvantage of using a connection oriented protocal such as TCP? A. Packet acknowledgement may add overhead B. packets are not tagged with sequence numbers C. Loss or duplication of data packets is more likely to occur D. The application layer must assume responsibility for correct searchers of the data packets
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI