When configuring the subnet mask for an IP address, which
formats can be used?A. dotted-decimal.
B. Hexadecimal
C. Bit-count
D. Octal
E. Binary
Is it possible that in a switched network that any port of the switch can be infected with any kind of viruses that jamed and create more traffic in network which cause slow network performance?
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments
How can you add the 192.168.100.0/30 network to EIGRP without involving the 192.168.100.4/30 network as well?
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
When we use loop back ip?
Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
What is a protocol
How ICMP is used in ping and traceroute facilities
Explain what is route poisoning?
What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP
Which command can verify Application Layer connectivity between 2 hosts? A.) ftp B.) snmp C.) telnet D.) ping E.) traceroute
What are the different types of VPN?