5. What is an advantage of using routers in your network?
(Choose all that apply)
A. Stops broadcast storms
B. Reduces downtime on your network
C. Creates internetworks
D. Can filter by logical address
Answers were Sorted based on User's Feedback
Answer / kapilasdhir
Answer: A, C, D
Routers can stop broadcast storms, create smaller networks
and filter by logical (IP) addresses.
| Is This Answer Correct ? | 6 Yes | 0 No |
Answer / ray
A, C, D - these are basic features of a router.
B. Downtime on of your network will not be reduced just
because you have a router. Any properly configured device
will reduce downtime.
| Is This Answer Correct ? | 3 Yes | 1 No |
Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in
What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos
Which of the following is not a characteristic of link-state routing protocols? ❍ A. VLSM support ❍ B. Route summarization at any bit level ❍ C. Full routing updates at regular intervals ❍ D. Discontiguous network support
On a network design project you determine that a new testing application requires multiple hosts. These hosts must be capable of sharing data between each host and an enterprise server at 10 Mobs bandwidth. Other divisions in the company use applications that require less than 2 Mobs bandwidth of the enterprise server. What is your most economical recommendation? A. That existing 10BaseT hubs be replaced with 1 00BaseT hubs to improve overall performance B. That a router can separate the testing application from the rest of the network, thus allowing the testing application more bandwidth. C. That a switch be installed, so that the enterprise server can be provided a 100 Mobs pod and each of the testing application hosts can be given dedicated 10 Mobs pods] D. That a bridge be placed between the enterprise server and all other users with the exception of the testing application
Given the following IP address from the Class B address range 172.35.21.12. Your network plan requires no more than 126 hosts on a shored. Which value should you use as the subnet mask? A. 255.255.0.0 B. 255.255.128.0 C. 255.255.126.0 D. 255.255.255.128 E. 255.255.255.252
Name the command we give on privilege mode for coming back to user execution mode?
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
Request any body to explain the parameters of Ipsec vpn tunnel while creating a tunnel in Cisco ASA.
Can you explain the basic of encryption in VPN?
What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message
Which protocol gets a hardware address from a known IP address? A.) RARP B.) TCP C.) IP D.) BootP E.) ARP F.) ICMP
Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191 D.) 1 - 191