Novell's implementation of RIP updates routing tables every ____ seconds. A. 60 B. 90 C. 10 D. 30
1 25579Which type of Ethernet framing is used for TCP/IP and AppleTalk? A. Ethernet 802.3 B. Ethernet 802.2 C. Ethernet II D. Ethernet SNAP
1 7649Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
6 33918What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.
2 8872Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of 255.255.255.0 ? A.) ip address 12.23.4.5 255.255.255.0 B.) ip address 12.23.4.5 /24 C.) ip address 12.23.4.5 mask 255.255.255.0 D.) ip address 12.23.4.5 mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address
3 8683Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash
4 14260Which three statements about Frame Relay configurations using subinterfaces is true? (Choose three) A. Each subinterface is conferred either multipoint or point to point B. Any network address must be removed from the physical interface C. The configuration of subinterfaces is done in router (config-if)# mode D. Frame Relay encapsulation must be conferred on each subinterface
2 5486At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance
12 47927When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised
8 14114You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode
10 18216Post New Wipro Interview Questions
Why corona leads to production of Ozone and glow of the color VOILET?
What is database architecture? : SQL Server Architecture
Have you ever helped resolve a dispute among others?
What are some facts about concrete?
what is your favorite memory from college?
Can you list some other automation testing tools that you are familiar with?
What ides you can use for node.js development?
What is difference between checked and unchecked exception in java?
Can you please explain the difference between array_name and &array_name?
how flow current in 220 kv line to line
State the difference between arrays and linked lists?
How do different xml technologies treat xml namespace declarations?
While defining chart of account, there is field "manual creation of cost element" and "automatic creation of cost element", what is it?
What is maintenance plant in plant maintenance?
How to transfer a table from one schema to another?