Explain the difference between tftp and ftp application layer protocols?





No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer



More CCNA Interview Questions

What does a Standard IP Access-list use as test criteria? A.) IP source address B.) IP source and destination address, protocol numbers and port numbers C.) IPX source and destination address D.) Source MAC address

2 Answers  


Bridges work at what layer of the OSI model? A.) Data Link B.) Network C.) Physical D.) Application

2 Answers  


What is Summarization and supernetting and what its use?

4 Answers  


What do you understand by redundancy?

0 Answers  


1>What do you mean by Networks and Networking? 2>Difference between Vlan And Sub Interface Vlan? 3>What is Fiber Optic Media Converter? 4>What is Firewall? 5>Difference Between Layer2 and Layer3 Switch? 6>What is the function of Multilayer Switch? 7>Expalin STP? What is the Difference between STP and MST? 8>What is the Function of VTP?Explain the modes of VTP? 9>What kind of Message VTp will Send? 10>What is the Difference between Normal and Manageable Switch? 11>Difference between Local Vlan and End to End Vlan? 12>Difference between Distance Vector and Link State Routing protocol? 13>What do you mean by Backbone Fast Port? 14>what is Root Guard and BPDU Guard?

0 Answers   Gemini, SpectraNet,






What is CIDR?

6 Answers   Wipro,


CCNA question and answer only for networking.

0 Answers  


What does the trace response !H mean? * A: Network unreachable * B: Not forwarded due to ACL restriction * C: Protocol unreachable * D: Port could not be reached

2 Answers  


Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM

1 Answers  


6. Which device can create smaller networks and stop broadcast storms by default? A. Repeater B. Bridge C. Router D. Gateway

4 Answers  


Given the following IP address from the Class C address range 192.168.21.12. Your network plan needs addresses for 28 small prkps Each office uses its own shored. The network design specifies that you confound for five bits of subnetting. When you confound for this in Cisco IOS software which shored mask should you use? A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248 E. 255.255.255.252

1 Answers  


What requirements should a VPN fulfill?

0 Answers   CCIE,





Categories