Which type of Ethernet framing is used for TCP/IP and
AppleTalk?
A. Ethernet 802.3
B. Ethernet 802.2
C. Ethernet II
D. Ethernet SNAP
Answer / guest
Answer: D
Ethernet 802.3 is used with NetWare versions 2
through 3.11, Ethernet 802.2 is used with NetWare 3.12 and
later plus OSI routing, Ethernet II is used with TCP/IP and
DECnet, and Ethernet SNAP is used with TCP/IP and
AppleTalk.
| Is This Answer Correct ? | 2 Yes | 0 No |
What is the update period for rip?
IP RIP routing is conferred on a router but not all interfaces attach to RIP networks. What should you use to prevent all RIP routing updates from being sent through selecedc interfaces without using access lists? A. passive route B. default routes C. passive interface D. route update filtering
What is the network subnet?
Explain the types of ospf configuration?
Which layer is responsible for routing through an internetwork? A.) Physical B.) Session C.) Network D.) Transport E.) Application F.) Data Link
Which command would configure Interface E0 with an IP address of 12.23.4.5 using a Subnet mask of 255.255.255.0 ? A.) ip address 12.23.4.5 255.255.255.0 B.) ip address 12.23.4.5 /24 C.) ip address 12.23.4.5 mask 255.255.255.0 D.) ip address 12.23.4.5 mask ff:ff:ff:0 E.) that is an invalid mask for a class 'A' address
Which command will give the following output: Tty Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int * 0 CTY - - - - - 0 0 0/0 - 1 AUX 9600/9600 - - - - - 0 0 0/0 - * 2 VTY - - - - - 2 0 0/0 - 3 VTY - - - - - 0 0 0/0 - 4 VTY - - - - - 0 0 0/0 - 5 VTY - - - - - 0 0 0/0 - 6 VTY - - - - - 0 0 0/0 -
Which protocol can do load balancing on unequal cost also?
How many access lists are allowed per interface? A. One per port, per protocol B. Two per port, per protocol C. Unlimited D. Router interface +1 per port.
What is a digital certificate?
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.
You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID