Identify the protocol to test connectivity without
configuring any
layer 3 protocols?
A.) TCP
B.) Ping
C.) IP
D.) CDP
E.) Telnet
Answer / guest
Answer: D
CDP can be used to verify connectivity prior to any layer 3
protocols
being configured.
| Is This Answer Correct ? | 2 Yes | 1 No |
What is the ieee standard for wireless networking?
What will be the prefix length of 224 in vlsm?
What is the default behavior of access-list?
what is meant by domain ? what is mean by DNS?
The -- terminal no editing -- command will perform what function? A.) Edit the contents of NVRAM B.) Allows access to the terminal port C.) Stops the advanced editing feature D.) Enable password functions
Which two steps are part of the process of creating Frame Relay subinterfaces on a point to point connection? (Choose two) A. configure the router to forward all broadcast packets B. remove any network address assigned to the physical interface C. configure the local data link connection identifier (DICI) for the subinterfaces D. cartoon the total committed information rate (CIP) available among the subinterfaces
Which OSI layer provides mechanical, electrical & procedural specifications for activating, maintaining physical link? A.) Presentation B.) Network C.) Application D.) Physical E.) Transport F.) Data-Link
Which of the following will show an extended access list 150? A.) sh access-list B.) sh ip int C.) sh ip access-list 150 D.) sh access-list 150 extended
Referring to the commands shown, what command must next be used on the branch router prior to traffic being sent to the router?
You are a network administrator and have been assigned the IP address of 201.222.5.0. You need to have 20 subnets with 5 hosts per subnet. What subnet mask will you use? A. 255.255.255.248 B. 255.255.255.128 C. 255.255.255.192 D. 255.255.255.240
How many collisions are caused by transmitting and receiving frames simultaneously in a full-duplex Ethernet technology? A. one B. two C. none D. several
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default