Which cable called v.35?
No Answer is Posted For this Question
Be the First to Post Answer
What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.
How many ports are present in a router?
Scenario: You created 2 access-lists for controlling telnet about a year ago, and bound one of them to Serial 0. You can't remember which access-list you used. Which command lets you see all access-lists on Serial 0 for telnet? A.) show access-list B.) show ip int s0 C.) show access-list telnet D.) show telnet access-list E.) show access-list s0 F.) show int s0
Tell me how much internal and external ad of eigrp protocol?
Can you explain voluntary and compulsory tunnels?
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
Explain what is overlaod?
When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.
When discussing static routes, what is the gateway parameter used for? A.) Determining the dynamic route B.) Defining the subnet C.) Defining the Administrative Distance D.) Determining the next hop
Define the virtual channel?
Why we using Tcp/IP. Why we can't use just Tcp ip? What is the meaning of '/' symbol in between this?
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list