4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN
NCTC,
3 164865. What is an advantage of using routers in your network? (Choose all that apply) A. Stops broadcast storms B. Reduces downtime on your network C. Creates internetworks D. Can filter by logical address
6 91476. Which device can create smaller networks and stop broadcast storms by default? A. Repeater B. Bridge C. Router D. Gateway
4 123237. What is an advantage to using switches in your network? A. Addressing of hosts by DHCP B. Ease of administration C. Stops broadcast storms D. Works like a repeater
2 57838. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges in your network C. When you install routers in your network D. When you use Switches configured with multiple VLANS
5 133899. Which STP state prevents the use of looped paths? A. Blocking B. Listening C. Learning D. Forwarding
2 543010. Which STP state populates the MAC address table but doesn't forward data frames? A. Blocking B. Listening C. Learning D. Forwarding
3 9198How many subnets can be gained by subnetting 172.17.32.0/23 into a /27 mask, and how many usable host addresses will there be per subnet?
11 38980
what is the difference between a ‘half-duplex’ and a ‘full-duplex’ system?
In how many ways you can access the router?
Hi Jitendera, Wat do u do..?? I mean r u working anywhere???? Basically where r u from??? If u don't hv any problem, u can say..?? Or else mail me mr.shahin07@gmail.com
Tell us the name of algorithm of eigrp protocol?
Tell me which protocol called rapid protocol?
GUYS i was refraining the OLD post and i got a good Question and wana make sure that you guys Just did not vist it for answers if you are not Aware google it understand it and then answered it the question is -: Significance of IP helper-address Command on SW? Is it necessary to put this command? you donot wana to give answer please donot visit this question and increase the vistor name if you are thinking that answer is wrong mark it wrong and explain why you are marking it wrong
When we use router?
Explain why is udp lease favored when compared to tcp?
In which access- list type you can't do editing?
Which protocol comes under hybrid dynamic type?
Does a bridge divides a network into smaller segments?
Name the 2 protocols are in wan technology?
What is the maximum value of administrative you can use?
When we use extended access-list?
Why do you use ‘service password encryption’?