What does the "IPX maximum-paths 2" command accomplish?
A. It enables load sharing on 2 paths if the paths are equal
metric paths.
B. It sets up routing to go to network 2.
C. It is the default for Cisco IPX load sharing.
D. It enables load sharing on 2 paths if the paths are
unequal metric paths.
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A
It enables load sharing on 2 paths if the paths
are equal metric paths. The default is 1 path and the
maximum is 512 paths.
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / nishant
Limits the number of paths for load balancing to 2 (4 =
default, 6 = maximum).
Is This Answer Correct ? | 0 Yes | 0 No |
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port
Although Cisco IOS 11.2 and later can auto-detect the LMI type in Frame Relay, which command will force the LMI type to q933a? A.) frame-relay lmi-type q933a B.) encapsulation frame-relay q933a C.) don't need to, it is the default D.) encapsulation q933a E.) encapsulation frame-relay type=q933a
Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config
What is the difference between DTE & DCE???
What is the default LMI type for Cisco Routers that are using Frame-Relay? A.) Gandalf5 B.) Q933A C.) Cisco D.) IETF E.) ARPA F.) SAP
Which IP address and wildcard mask would you use in your ACL to block all the hosts in the subnet 192.168.16.43/28?
You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255
Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and tear down of virtual circuits? A.) Session B.) Network C.) Physical D.) Transport E.) Application F.) Presentation
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.
What are the ranges of private ips?
Which memory component on a Cisco router contains the dynamic system configuration? ROM NVRAM Flash RAM/DRAM
Identify the 2 commands that will display the status and information about interface E0 only? A.) show interface ethernet E0 B.) show interface E0 C.) show E0 D.) show int E0 E.) show interface