Which command, that is used to test address configuration,
uses Time-To-Live (TTL) values to generate messages from
each router.
A. trace
B. ping
C. telnet
D. bootp
Answer / guest
Answer:: A
The Cisco IOS EXEC command "trace [protocol]
[destination]" is used to discover routes that packets will
travel to their destination hosts. Trace uses TTL (Time to
Live) values to report destination route information.
| Is This Answer Correct ? | 6 Yes | 1 No |
Which two of the following protocols are used at the Transport layer? A.) ARP B.) UDP C.) ICMP D.) RARP E.) TCP F.) BootP
Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any eq 21 log B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21 log C.) router(config)# access-list 101 permit any any 172.16.30.0 D.) router(config)# access-list 101 permit ip host 172.16.30.0 any eq 21 log
Identify the command mode necessary to enter the standard ping command? A.) Router(config)# B.) Router> C.) Router(std-ping)# D.) Router(config-if)#
The following is partial output from a routing table ; '192.168.10.0 [100/1300] via 10.1.0.1, 00:00:23, Ethernet1' Which routing protocol is being used? (assuming defaults have not been changed) A.) OSPF B.) RIP C.) BGP D.) IGRP
You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255
Can you explain the broader steps of how L2F establishes the tunnel?
You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0
What is the difference between bus topology and hub?
Explain the draw back of ospf protocol?
You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.255.252, B,128.16.32.12, 128.16.32.15 B. 255.255.255.252, C,128.16.32.12, 128.16.32.15 C. 255.255.255.252, B,128.16.32.15, 128.16.32.12 D. 255.255.255.248, B,128.16.32.12, 128.16.32.15
Identify 2 characteristics of PPP? A.) Uses LLC to establish the link B.) Default serial encapsulation C.) Support multiple layer 3 protocols D.) Offers two types of authentication; PAP and CHAP
What is ping used for?