When configuring the subnet mask for an IP address, which
formats can be used?A. dotted-decimal.
B. Hexadecimal
C. Bit-count
D. Octal
E. Binary
What 3 sources can configuration commands be placed into RAM? A.) HP Openview B.) Console C.) Vterminal D.) TFTP server E.) NVRAM
X.25 is characterized by layer 2 identifiers, and what else? A.) Virtual Lan's B.) Session Layer C.) Transport Layer D.) Routing Updates E.) PVC's
What does the acronym ARP stand for? A.) Address Resolution Phase B.) ARP Resolution Protocol C.) Address Resolution Protocol D.) Address Recall Protocol
All equipment located at the customers site is called: A.) CPE B.) CO C.) DCE D.) Demarc E.) DTE
You just entered the following command_Router(config#) line console 0 Which operation is most likely to follow? A. Confound terminal type B. enter protocol parameters for a serial line C. create a password on the console terminal line D. establish a terminal type 4 connection to a remote host E. change from configuration mode to console privileged mode
10 Answers Intel, Quark, Wipro,
Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables
frends i am suffring from newfolder.exe virus in my server 2000 win how i have to remove it plz help me Jitendera sinha
FastEthernet compares to 10baseT Ethernet in which of the following ways
what is meant by wild card mask and why can't we use in eigrp ?
Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connnections D.) Path selection E.) MAC address examination F.) Network monitoring
What are 3 ways to provide login access to router? A.) Console B.) TFTP C.) Rlogin D.) Auxiliary Port E.) X Windows F.) Telnet
Mention what are the ranges for the private ips?