Which two does 100BaseT use? A.) CSMA/CD B.) IEEE 802.5 C.) 802.3u D.) Switching with 53-byte cells
1 4042Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link
2 12860Which of the following is used to manage and monitor the network? A.) SNMP B.) HTTP C.) IP D.) FTP
4 7060What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
2 5231The maximum distance on a 10BaseT network from the hub to a workstation is which of the following? A.) 500 meters B.) 1000 meters C.) 100 meters D.) 1500 meters
2 8122What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic D.) Distance Vector
4 25115Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation
1 7123What are hold-downs used for? A.) To prevent regular update messages from reinstating a route that has come back up B.) Information received on an interface cannot be sent back out the same interface C.) To prevent regular update messages from reinstating a route that has gone down D.) To hold the routing table from being sent to another router
1 5823Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP
1 4222Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
1 3939Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
3 19582Which port numbers are used by TCP and UDP to set up sessions with other hosts? A.) 1024 and above B.) 6 and 17 respectively C.) 1-25 D.) 6-17
2 5440Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
6 33735What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos
1 4440
What are the protocol data units (pdu) in ccna?
Which type of updates eigrp protocol do?
How many fillers we can put in one ip of ipv6?
What are the possible ways of data exchange in ccna?
Can you explain L2TP?
What are the advantages of a layered model in the networking industry?
Frame relay technology works on which layer of osi model?
1900 Value in which type of access list?
Name the command we give on privilege mode for coming back to user execution mode?
How many ways are there to implement VPN architecture?
What is the difference between tracert and traceroute?
How many (minimum and maximum) ports are present in a router?
What is mac address size of ipv6?
Which protocol called rapid protocol?
What is the maximum value of administrative you can use?