You can access three forms of WAN services with Cisco routers.
Select the three forms:
A. Switched or relayed services
B. Interface front end to IBM enterprise data center computers
C. Using protocols that connect peer-to-peer devices like
HDLC or PPP
encapsulation.
D. IPX/SPX
E. NetBEUI
Answer / guest
Answer:: A, B & C
You can access three forms of WAN services with Cisco
routers. Switched
or relayed services include X.25, Frame Relay, and ISDN. An
interface
front end to IBM enterprise data center computers includes
SDLC. And,
you can access the services of WAN providers using protocols
that
connect peer devices such as HDLC and PPP encapsulation.
IPX/SPX and
NetBEUI are LAN protocols.
| Is This Answer Correct ? | 0 Yes | 0 No |
What are the different types of password used in securing a cisco router?
Given the global configuration commands: 'banner motd #' 'Hello #' When would the message be displayed? A.) The message of the day banner shows up before login. B.) The message of the day banner shows up during logoff. C.) These commands are not the right syntax for MOTD. D.) Message of the day banners are displayed upon entering global config mode. E.) Message of the day banners are not possible. F.) The message of the day would be, 'Hello #'
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.
Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C.) Router> D.) Router(priv)#
What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos
Which layer of the 7 layer model provides services to the Application layer over the Session layer connection? A.) Transport B.) Application C.) Session D.) Network E.) Datalink F.) Presentation
In how many ways can data be transferred in ccna?
In which two modes can the ICMP ping command be used? (Choose two) A. user B. privileged C. global configuration D. interface configuration
You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255
please name some routed protocol.
Define load balancing?
What are four functions/characteristics of the network layer of the OSI model? (Choose four) A. It uses a two-part address B. It maintains routing tables C. It uses broadcast addresses D. It establishes network addresses E. It provides access to the LAN media F. It provides media independence for upper layers G. It provides path selection for Internetwork communication