Identify the 3 pieces of hardware you would not install to
prevent
broadcasts?
A.) Switch
B.) Repeater
C.) Bridge
D.) Router
Answer / guest
Answer: A B C
Router are implemented not only to break up networks into
smaller
segments but they are used to block broadcasts.
| Is This Answer Correct ? | 3 Yes | 1 No |
Which cable called v.35?
The maximum distance on a 10BaseT network from the hub to a workstation is which of the following? A.) 500 meters B.) 1000 meters C.) 100 meters D.) 1500 meters
Identify the 2 commands that save the running-config to a TFTP server? A.) write running tftp B.) copy running network C.) copy running tftp D.) write network
Which command listed below sets the banner message when someone connects to the router? A.) message # B.) banner # C.) login banner # D.) description # E.) login description # F.) banner motd #
Which protocol supenetting is enable by default?
Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Data link
What is subnetting and why it is use?
HI I am Rajveersinh. I am Leaving in Ahmedabad-gujarat. I am Hardware & Networking Stundent In JETKING. my Intersted in CICKO Side. Please send ME totel detail in CICKO surtifiction my E-mail ID IS as_raj@ymail.com
Mention what BOOTP is?
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
Which two commands show your access lists? (Choose two) A. show filters B. show access-lists C. show ip access-lists D. show running-config
1-what is the diffrence between hdlc and ppp protocol 2- why frame realy technogy called NBMA