What does the trace response !H mean?

* A: Network unreachable
* B: Not forwarded due to ACL restriction
* C: Protocol unreachable
* D: Port could not be reached

Answers were Sorted based on User's Feedback



What does the trace response !H mean? * A: Network unreachable * B: Not forwarded due to..

Answer / jitendera sinha

answer is B
that is not forwarded due to acl

Is This Answer Correct ?    14 Yes 6 No

What does the trace response !H mean? * A: Network unreachable * B: Not forwarded due to..

Answer / mahesh

! -- success
* -- time out
N -- network unreachable
H -- host unreachable
P -- protocol unreachable
A -- admin denied
Q -- source quench received (congestion)
? -- unknown (any other ICMP message)


here in this case no option of host unreachable so may be B
is write,bcoz it can reach the network but cant reach
host,if network is unreacable we may get N

Is This Answer Correct ?    4 Yes 3 No

Post New Answer

More CCNA Interview Questions

I have one problem in my network my windows xp pc in workgroup there r 2 NIC card one I have disable in and second is active. The problem is in a day some time its ip conflict with other and when I see the event log and get the conflict ip mac and scan it with LAN scanner on one is there for that mac address nic in my network I have disable dhcp also don’t know what is the problem

8 Answers  


Which 2 protocols are in wan technology?

0 Answers  


What is the default behavior of access-list?

0 Answers  


Inverse ARP serves what purpose? A.) Method for a local router to introduce itself to the remote end of the connection B.) Broadcast a routing table update C.) Identify MAC addresses if the IP address is known D.) Sent every 10 seconds used to verify the Frame Switch is still active

1 Answers  


Which of the following are examples of the Application Layer? A.) LLC B.) Token Ring C.) Spreadsheet D.) TCP E.) IP F.) Word Processor

1 Answers  






What is the size of ipv6?

0 Answers  


What are the advantages of lan switching?

0 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

1 Answers  


i want to ask one question that why u guys are not posting the questions is any thing wrong please post question for your and others including me knowledge

3 Answers  


Q: why are switch trunking modes ( dynamic auto , dynamic desirable )used in switch while trunking? if only negotiation is the factor it can be done with one mode as well ie dynamic desirable . but why we need dynamic auto. coz it dsnt negotiates ..at all please post answer asap thanks :

2 Answers  


Identify 2 features of PPP CHAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) Less secure then PAP D.) Local router 'challenges' the remote router

1 Answers  


Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub

1 Answers  


Categories