Identify 3 Fast Ethernet technologies?
A.) 100 Base FastEther
B.) 100 Base FX
C.) 100 Base T4
D.) 100 Base TX
Answers were Sorted based on User's Feedback
Answer / guest
Answer: B C D
100 BaseFastEther is false. 100 Base FX, TX and T4 are all
valid.
Is This Answer Correct ? | 0 Yes | 0 No |
Answer / anupam alok
Answer is B,c and D
100 Base FX is for fiberoptics And base TX or T4 is for work
stations T4 supports transmission up to 100 mbps.
Is This Answer Correct ? | 0 Yes | 0 No |
Given an IP host address of 172.16.2.160 and a shored mask of 255.255.255.192 to which shored does the host belong? A. 172.16.2.32 B. 172.16.2.64 C. 172.16.2.96 D. 172.16.2.128 E. 172.16.2.192
When configuring the subnet mask for an IP address, which formats can be used?A. dotted-decimal. B. Hexadecimal C. Bit-count D. Octal E. Binary
Which network mask should you place on a Class C address to accommodate a user requirement for five networks with a maximum of 17 hosts on each networks A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248
What is the Function of Router?
What must be true for two Routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D)Configured for PPP
Which EXEC command displays system hardwarde configuration information software version and the names and sources of configuration files and boot images on a router? A. show boot B. show flash C. show config D. show version
What is the purpose and default value of the CDP timer command? A.) 90 seconds; interval before an entry expires B.) 60 seconds; interval between updates C.) 60 seconds; interval before an entry expires D.) 90 seconds; interval between updates
When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised
Which ipsec rule is used for the olympia branch and what does it define? (Choose two)
Can you explain in a generic manner the packet of IPSec?
Which command we use for ping in ipv6?
Can you explain tunneling?