Dear Mr.Shahin thank you very much for your advise i realy
thanks full to you.
Best of luck
Answers were Sorted based on User's Feedback
Answer / jitu
Dear mr shain
know u become a tech guru.so plse also
advise be about one question that
wrong number kabhi engae koi nahi hota hai?
that is why wrong number never be engage
answer it ha ha aha
Is This Answer Correct ? | 0 Yes | 1 No |
What are two ways IPX supports multiple logical networks on an individual underrate? (Choose two) A. network number B. routing protocol C. encapsulation type D. autonomous system number
Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config
Which service uses telephone control messages and signals between the transfer points along the way to the called destination? A. Signaling System 7 (SS7) B. Time-division Multiplexing (TDM) C. X.25 D. Frame relay
Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) Token Ring E.) IP
What is the diiffernce between windows xp & windows 2000?
6 Answers TCS, Trimax, Trymax, VigaTech,
Of the following switching types, which one has the highest latency? A.) Cut-through B.) None C.) Store-and-forward D.) Fragment Free
Your Ethernet interface currently has the IP address of 1.1.1.1/24. You would like it to have a second IP address of 2.2.2.2/24. Which command will do that? A.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 B.) ip address 2.2.2.2 255.255.255.0 secondary C.) ip address 2.2.2.2 255.255.255.0 D.) This cannot be done, you can only have 1 IP address per physical interface. E.) ip address 2.2.2.2 /24
In which protocol supenetting is enable by default?
what is secure hand shake protocol
What is difference between flsm and vlsm?
Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery
what is the binary value of loop back address