In the setup dialog, what do the square brackets indicate?
A. current or default spores
B. hard coded values that cannot be modified
C. values entered by the administrator but not saved
D. values that must be written to PAVRAM before becoming enabled
What are the ranges of private ips?
When using RIP, routing updates are broadcast every ____ seconds. A. 30 B. 10 C. 60 D. 90
In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.
friends i have some problem in the acess list plz help me out. purbi sinha. 1 what is the diffrence b/w inbound and out bound access list 2 what is main diffrence betwwen standred acesslist and extended access list 3 where should i keep stnadred access list and exatended access list i mean at which interface and why? 4 why wild card masking is used 5 what is switch febric in switching plz help me out i am litle bit confuse
What are four functions/characteristics of the network layer of the OSI model? (Choose four) A. It uses a two-part address B. It maintains routing tables C. It uses broadcast addresses D. It establishes network addresses E. It provides access to the LAN media F. It provides media independence for upper layers G. It provides path selection for Internetwork communication
Identify the command to configure the router to boot from an IOS located on a TFTP server? A.) boot system tftp IOS.exe 172.16.5.1 B.) boot system tftp 172.16.5.1 IOS.exe C.) boot system flash tftp 172.16.5.1 D.) boot system IOS.exe 172.16.5.1
What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos
What is the function of the Application Layer in networking?
What are 10base2 ethernet lans?
Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link
Identify the 2 commands the saves the running-config to NVRAM? A.) write memory B.) copy running-config startup-config C.) write network D.) write backup
When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.