No Answer is Posted For this Question
Be the First to Post Answer
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
Explain the term 'unicast'.
Which network mask should you place on a Class C network to accommodate a user requirement of ten subnetworks? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248
Do you know how many types of data?
What is the difference between csma/cd and csma/ca?
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
How many hope count rip or rip2 can send updates?
A ISDN BRI circuit can be described as a which of the following? A.) 3B channels B.) 2-64Kbps B channels and 1-16Kbps D channel C.) none of the above D.) 2-64Kbps B channels and 1-16Kbps C channel
what is lmi? how many type of lmi's we are using ...
Identify 3 characteristics of an IP address? A.) Contains a network portion and a host portion B.) 32 bits long C.) Unique to each network D.) Part of the default Cisco configuration E.) Referred to as the hardware address
Can you explain the difference between trusted and untrusted networks?
Which command will copy the routers configuration from NVRAM to a Network file server? A.) copy start tftp B.) copy start tftp server C.) copy tftp startup-config D.) copy running-config tftp E.) copy startup-config tftp