Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the formula for metric of ospf?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Identify the command to display the IP routing table? A.) show route B.) show ip route C.) show ip table route D.) show ipx route

1 Answers  


1.i have to pcs in the network 192.168.1.1 202.55.88.16 2. if that fails shud go through 122.16.1.3 and and if that comes back active it shud go through 202.55.88.16 itself

1 Answers  


Which protocol used before part of ccna?

0 Answers  


What are partial updates?

0 Answers  


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list

1 Answers  


Can you explain PPP link process step by step?

0 Answers   CCIE, Sawes,


What hppends when ping 127.0.0.1 command executes?

10 Answers   CMS, Wipro,


3. What does a bridge use to segment a network? A. IP Addresses B. Broadcasts C. Application data D. Media Access Control addresses

2 Answers  


In stead of 0.0.0.0 wild card mask what you can write after ip?

0 Answers  


Which of the following are examples of the Session Layer? A.) IP B.) Netbios Names C.) NFS D.) Token Ring E.) SQL F.) RPC

2 Answers  


What is the usage of service password encryption?

0 Answers  


Categories