Identify 3 methods used to prevent routing loops?
A.) Split horizon
B.) Holddown timers
C.) Poison reverse
D.) SPF algorithm
E.) LSP's
Answers were Sorted based on User's Feedback
what is the binary value of loop back address
To which layer ICMP belongs
Which element is used to define the rate in bits per second that a Frame Relay switch agrees to transfer data? A. clock rate (CP) B. Committed Information Rate (CIR) C. Local Management Interface (LMI) D. data link connection identifier (DICI) E. Committed Rate Measurement Intercal (CRIMI)
Why do you use ‘service password encryption’?
Identify the command to configure the configuration-register? A.) Router# config-register 0x2102 B.) Router(config)# config-register 0x2102 C.) Router(config-reg)# 0x2102 D.) Router> config-register 0x2102
What is subnet? Why is it used?
How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode
Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply
Name the command we give for see routing table?
CCNA question and answer only for networking.
1 what is the number of telnet session in the cisco router a 1 b 2 c 3 d 4 e 5
Regarding frame relay, which of the following statements are true? A.) You must use ANSI encapsulation if connecting to non-Cisco equipment B.) You must use IETF encapsulation if connecing to non-Cisco equipment C.) You must use Q.933a encapsulation if connecing to non-Cisco equipment D.) You must use Cisco encapsulation if connecting to non-Cisco equipment