Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
1 4481Inverse ARP serves what purpose? A.) Method for a local router to introduce itself to the remote end of the connection B.) Broadcast a routing table update C.) Identify MAC addresses if the IP address is known D.) Sent every 10 seconds used to verify the Frame Switch is still active
1 4464Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion
2 8464Identify the type of routing protocol that exchanges entire routing tables at regular intervals? A.) Link state B.) Interior gateway protocols C.) Appletalk routing D.) Distance vector
1 4000Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
1 4903Identify 3 characteristics regarding CDP? A.) On by default B.) Shows only directly connected neighbors C.) Requires IP or IPX D.) 60 second update interval by default E.) 30 second updates interval by default
1 5257Identify 2 features of X.25? A.) Supports only IP B.) Utilizes switched and permanent virtual circuits C.) Contains minimal flow control and error recovery D.) Utilizes LAPB as it's data-link protocol
4 8363Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
2 6424Identify the purpose of the TCP 3 step handshake? A.) Setup a un-reliable connection B.) Initialize routing tables C.) Synchronize sequence numbers between hosts D.) Connection tear down process
1 5553Identify 2 PPP characteristics? A.) Is proprietary to Cisco B.) Supports authentication C.) Support compression D.) Run on a multi-access network
1 5267Which statements are true regarding half duplex? A.) Only works in a point-to-point configuration B.) Allows for transmitting and receiving but not at the same time C.) Allow for transmitting and receiving of data simultaneously D.) Doubles the bandwidth
2 5337Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address
1 4798Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Data link
3 10875
What is collision?
Explain how many broadcast domains are in switch?
Can you explain different components in PKI?
Who controls mac address uniqueness and how?
What are the conversion steps of data encapsulation?
Tell me why we use filter option?
When we use extended access-list?
What is the size of hello packets in eigrep protocol?
What is difference between routing and routed protocols?
Which feature should a routing protocol have to support vlsm?
Which protocol used before part of ccna?
Which cable called v.35?
How is private ip different from public ip?
Explain the benefits of vlan?
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?