Explain the difference between tftp and ftp application layer protocols?
No Answer is Posted For this Question
Be the First to Post Answer
What does a Standard IP Access-list use as test criteria? A.) IP source address B.) IP source and destination address, protocol numbers and port numbers C.) IPX source and destination address D.) Source MAC address
Bridges work at what layer of the OSI model? A.) Data Link B.) Network C.) Physical D.) Application
What is Summarization and supernetting and what its use?
What do you understand by redundancy?
1>What do you mean by Networks and Networking? 2>Difference between Vlan And Sub Interface Vlan? 3>What is Fiber Optic Media Converter? 4>What is Firewall? 5>Difference Between Layer2 and Layer3 Switch? 6>What is the function of Multilayer Switch? 7>Expalin STP? What is the Difference between STP and MST? 8>What is the Function of VTP?Explain the modes of VTP? 9>What kind of Message VTp will Send? 10>What is the Difference between Normal and Manageable Switch? 11>Difference between Local Vlan and End to End Vlan? 12>Difference between Distance Vector and Link State Routing protocol? 13>What do you mean by Backbone Fast Port? 14>what is Root Guard and BPDU Guard?
What is CIDR?
CCNA question and answer only for networking.
What does the trace response !H mean? * A: Network unreachable * B: Not forwarded due to ACL restriction * C: Protocol unreachable * D: Port could not be reached
Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM
6. Which device can create smaller networks and stop broadcast storms by default? A. Repeater B. Bridge C. Router D. Gateway
Given the following IP address from the Class C address range 192.168.21.12. Your network plan needs addresses for 28 small prkps Each office uses its own shored. The network design specifies that you confound for five bits of subnetting. When you confound for this in Cisco IOS software which shored mask should you use? A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248 E. 255.255.255.252
What requirements should a VPN fulfill?