Which command, that is used to test address configuration,
uses Time-To-Live (TTL) values to generate messages from
each router.
A. trace
B. ping
C. telnet
D. bootp
Answer / guest
Answer:: A
The Cisco IOS EXEC command "trace [protocol]
[destination]" is used to discover routes that packets will
travel to their destination hosts. Trace uses TTL (Time to
Live) values to report destination route information.
| Is This Answer Correct ? | 6 Yes | 1 No |
Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM
What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16
Write the procedure for Router for configuring DHCP?
Which three protocols are correctly matched to their transport layer functions? (Choose three) A. route selection IP B. sliding window UDP C. well known pods IP D. route validation ICMP E. connection oriented TCP F. three-way handshake TCP G. no sequence and acknowledgement UDP
What is matric?
Which layer is responsible for determining if sufficient resources for the intended communication exists? A.) Application B.) Network C.) Session D.) Presentation E.) Transport
Identify the following command to configure a secret password to 'cisco'? A.) Router(config)#enable password cisco secret B.) Router(config)#enable secret cisco C.) Router(config)#enable secret password cisco D.) Router(config)#set secret = cisco
Which two physical interfaces support PPP? (Choose two) A. Ethernet B. Token Ring C. Synchronous serial D. Asynchronous serial
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
Which statement about an IP network is true? A. A broadcast source MAC address contains all zeros B. A MAC address is part of the physical layer of the OSI model C. MAC addresses are used by bridges to make forwarding decisions. IP address are used by routers. D. IP addresses allow a flat addressing scheme. MAC addresses use a hierarchical addressing scheme.
Why we choose the router rather then L-3 Switch
8 Answers Network Solutions, Wipro,
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2