can anyone tell me which r the companies hiring freshers ( ccna )
in mumbai
Answer / ahmedabad
it is very useful networking.many person are not exprience
for suggest knowledge on company for working
Is This Answer Correct ? | 3 Yes | 1 No |
Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router
what is unike ip address
Identify the components in the following command 'interface serial0/1/1' A.) Serial interface, port number 0, slot 1, port adapter 1 B.) Serial interface, slot 1, port number 1, port adapter 0 C.) Serial interface, slot 0, port adapter 1, port number 1
Which command should you use to confound a router so that it can become a TFTP server host for a router system image that is run in a Flash? A. copy flash tftp B. config tftp server C. write, network -router name- D. tftp-server system -file name- E. setup server tftp -system name-
Which IP Address Class is INCORRECTLY paired with its range of network numbers? A. Class A addresses include 192.0.0.0 through 223.255.255.0 B. Class A addresses include 1.0.0.0 through 126.0.0.0 C. Class B addresses include 128.0.0.0 through 191.255.0.0 D. Class C addresses include 192.0.0.0 through 223.255.255.0 E. Class D addresses include 224.0.0.0 through 239.255.255.0
Which of the following is a routing protocols? TCP RIP SMTP UDP
Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199
What is the Difference between Hub and Switch?
What is required to support full-duplex Ethernet? A.) Multiple paths between multiple stations on a link B.) Automatic sensing operation by all connected stations C.) Loopback and collision detection disabled D.) Full-duplex NIC cards
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
Which processes does TCP, but not UDP, use? A. Windowing B. Acknowledgements C. Source Port D. Destination Port
Which mode called privilege mode?