Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


If configuring a Cisco router to connect to a non-Cisco router

across a Frame Relay network, which encapsulation type would
you select?

A.) Q933a

B.) ISDN

C.) IETF

D.) CISCO

E.) ANSI



If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network, whic..

Answer / guest

Answer: C

There are two types of Frame Relay encapsulations; Cisco and
IETF. IETF

is required when connecting a Cisco to a non-Cisco router.

Is This Answer Correct ?    3 Yes 0 No

Post New Answer

More CCNA Interview Questions

What are the 3 ways routers learn paths to destination networks? A.) Dynamic B.) Static C.) Routing tables D.) Default

2 Answers  


When setting up a WAN network, everything outside of the Demarc is not owned by the customer. Which of the following are not owned by the customer? A.) The T1 line. B.) LAN C.) The Router D.) DTE E.) PC's F.) CO

1 Answers  


Given the following IP address from the Class B address range 172.35.21.12. Your network plan requires no more than 126 hosts on a shored. Which value should you use as the subnet mask? A. 255.255.0.0 B. 255.255.128.0 C. 255.255.126.0 D. 255.255.255.128 E. 255.255.255.252

5 Answers  


Which device works at the Network Layer of the OSI model? Router Switch Bridge Hub

5 Answers   CET, IBM,


You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255

1 Answers  


Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to deliver the frame to the end device E.) Contains a network portion and a host portion

2 Answers  


Do we subletting of ip?

0 Answers  


What hppends when ping 127.0.0.1 command executes?

10 Answers   CMS, Wipro,


Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector

1 Answers  


A routing table contains static, RIP, and EIGRP routes for the same destination network. Which route would normally be used to forward data?

15 Answers   TCS, Wipro,


If a frame is received at a switch and only the destination hardware address is read before the frame is forwarded, what type of switching method is this? A.) Store-and-drop B.) Latency C.) Store-and-forward D.) Cut-through

1 Answers  


Significance of IP helper-address Command on SW? Is it necessary to put this command?

1 Answers   Accenture,


Categories