Hi Jitendera, Wat do u do..?? I mean r u working
anywhere???? Basically where r u from??? If u don't hv any
problem, u can say..?? Or else mail me mr.shahin07@gmail.com
No Answer is Posted For this Question
Be the First to Post Answer
How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode
Can you explain voluntary and compulsory tunnels?
How can you add the 192.168.100.0/30 network to EIGRP without involving the 192.168.100.4/30 network as well?
Which OSI layer performs code conversion, code formatting and encryption? A.) Physical B.) Data-Link C.) Application D.) Transport E.) Presentation F.) Network
Hi Jitendera, I continuously read your answers which is more knowlegable than books... Q.I am facing some problems in subnetting.can you plzz explain the subnetting process.. will be remain thankful
what is the default ad value of the interface directly coneted to router. as for exmaple ad value of ospf is 90 then from ehternet the network is conected whta is difault value of that directly conected interface. what is the defalt ad value of bgp whta is access llist and how many type of access list what is vlan what is vpn how e congigure the router what is mpls these are the question skrd to me at tcs i have replyed all ecxept the first one
What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
Which of the following can reply to a Novell Get Nearest Server (GNS) request? A.) Local Novell server B.) Remote Novell Printer C.) Cisco router D.) Novell client
In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.
Name the command we give on privilege mode for coming back to user execution mode?
Which two does 100BaseT use? A.) CSMA/CD B.) IEEE 802.5 C.) 802.3u D.) Switching with 53-byte cells