Hi all,
Kindly can you tell me what is demand ccna voice in field and
what is profile of ccna voice.so pl very urgent bcz i am
going to join institute
Answers were Sorted based on User's Feedback
Answer / dharmendra kumar soni
actually i am completed B.COM can u tell me that can i get
job in the telephony engineer by ccna voice.pls recently
reply this mail all of you .
Is This Answer Correct ? | 4 Yes | 0 No |
Answer / abb india
Hi this world is telecomunication world and as you know
this field is ever green so this is a good to go through
the ccna voice its really kool
Is This Answer Correct ? | 4 Yes | 2 No |
Answer / shabu
Hi,
Nice to hear that though you are a Bcom graduate, you are
intereted to do CCNA voice. Its really appreciated. But to
do CCNA voice, there is a pre requisite ie means, you
should be CCNA certified and then only you can go for CCNA
voice.
Frankly speaking, if you have fund, I recommend you to do
CCVP after CCNA, instead of CCNA voice. Becoz you will get
a very thorough knowledge on VOIP and very attractive
salary if you are CCVP certified by CISCO.
Make sure that you are certified by Cisco and try to study
at a Cisco Authorised Learning Centre, so that you will
get the good infrastructure, Cisco Training & Lab Kits,
Cisco Certified Trainers and Exam facility etc...
Is This Answer Correct ? | 0 Yes | 1 No |
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process
Write out a config to permit only the below MAC address to pass traffic through a port on your switch. in another way writhe a confrigation which permit only mac address trfaic through a port of your switch
Which command we give for see routing table?
Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash
How many Frame-relay encapsulation types are available with Cisco routers? A.) Four B.) Two C.) Five D.) Three
When we use extended access-list?
Define the virtual path?
Cisco's implementation of ISDN BRI has multi protocol support, SNMP MIB support, and what other features? A.) Call waiting B.) Compression C.) ADSL D.) 1.544 Mbps E.) Call screening F.) Negative 'G' support
in which way the datas will transfer from one host to another host by using osi layer?
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
Using the access-list command, 'access-list 1 deny 2.2.2.2', what else must be done to stop host 2.2.2.2 from sending any traffic out of physical interface E0, while still allowing other traffic? A.) In global mode, Add a line - 'access-list 1 permit 0.0.0.0 255.255.255.255' B.) On interface E0, Add a line - 'access-group 1 in' C.) In global mode, Add a line - 'access-list 1 permit all' D.) On interface E0, Add a line - 'access-list 1 in' E.) On interface E0, Add a line - 'access-list 1 out' F.) On interface E0, Add a line - 'ip access-group 1'
Explain the matric of eigrp protocol?