When configuring the subnet mask for an IP address, which
formats can be used?A. dotted-decimal.
B. Hexadecimal
C. Bit-count
D. Octal
E. Binary
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
The maximum distance on a 10BaseT network from the hub to a workstation is which of the following? A.) 500 meters B.) 1000 meters C.) 100 meters D.) 1500 meters
Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connnection-less oriented D.) Incorporates no handshaking
Explain the difference between simple authentication and md5?
Which of the following would be displayed by the command 'SHOW CDP NEIGHBOR DETAIL'? A.) The incoming/outgoing port. B.) The hardware platform. C.) One address per protocol. D.) Amount of Flash Memory Available E.) The routers hostname. F.) The subnet mask, if IP is configured.
What is Data, management, native, default,trunk and access vlan?
What is difference between switch & hub?
Why Authentication Header (AH) is not compatible with the network that using NAT?????? Jitu, looking for u specially...!!!! U knw why i m looking for u..!!!
b Which protocol for PPP LCP (Link Control Protocol) performs a challenge handshake? A. CHAP B. PAP C. UDP D. IPX
what is vlan
Which switching technology can reduce the size of a broadcast domain? A.) Cut-Through B.) Store-and-Forward C.) Spanning Tree Protocol D.) RARP E.) ARP F.) VLAN
Wild card mask always in odd value or even?