"snap" is used by the Cisco IOS for which encapsulation
types?
A. Ethernet_SNAP
B. Token-Ring_SNAP
C. FDDI_SNAP
D. Novell-SNAP
E. Novell-FDDI.
Answer / guest
Answer:: A,B &C
Novell's IPX and Cisco's IOS name their
protocols differently. Cisco uses sap for Ethernet_802.2,
Token-Ring, and Novell's FDDI_802.2. Cisco uses snap for
Ethernet_SNAP, Token-Ring_SNAP, and FDDI_SNAP. Cisco uses
arpa for Ethernet_II and, finally the default is
Novell-ether for Novell's Ethernet_802.3.
Is This Answer Correct ? | 2 Yes | 0 No |
What is BootP?
which of the following address represent unicast address A 224.1.5.2 B ffff.ffff.ffff.ffff C 192.168.24.59/30 D 255.255.255.255 E 172.138.128.255 plz tell what should be answer plz tell with explanation
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list
What is the updates time of routing table,and what is the invalid timer, and also what is the flush timer in IGRP and EIGRP?
Explain the difference between bus topology and hub?
What is an advantage of UDP? Low Overhead High Overhead Reliable Not reliable
how many pass word you can configure on cisco 2500 router
Which address or number is used to pass the data to the correct application? MAC Number IP address Port Number Segment Number
What was the key reason the International Organization for Standardization released the OSI model? A. users could access network servers faster B. different vendor networks could work with each other C. the industry could create a standard for how computers work D. network administrators could increase the overall speed of their network
Layer 1 and Layer 2 devices must forward a broadcast. Which of the following devices fall into this category? Gateway Switch Router All of the above.
Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged the are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address