Identify the purpose of the Trace command?
A.) Explorer packet transmitting routing information
B.) Test connectivity
C.) Determine the path a packet is taking through the network
D.) Transmits user data when buffers are full
Answer / guest
Answer: C
The trace command is used to determine the path a packet has
taken
through the network.
Is This Answer Correct ? | 1 Yes | 0 No |
2500 Value in which type of access list?
What would be the proper wildcard mask to permit all odd numbered hosts on the 10.48.0.0/12 network? access-list 1 permit 10.48.0.0 0.15.255.255 access-list 1 permit 10.48.0.1 0.15.255.254 access-list 1 permit 10.48.0.0 0.15.255.1 access-list 1 permit 10.48.0.0 0.0.0.254 access-list 1 permit 10.48.0.0 0.0.0.255
Which layer is responsible for determining if sufficient resources for the intended communication exists? A.) Application B.) Network C.) Session D.) Presentation E.) Transport
Which command do you use to set the Secret password to 'roundwood'? A.) enable login roundwood B.) enable password roundwood C.) enable privilege roundwood D.) enable secret= roundwood E.) enable secret login roundwood F.) enable secret roundwood
CSMA/CD stand for which of the following? A.) Carrier Sense, Multiple Access with Collision Detection B.) Collision Sense, Multiple Access with Collision Detection C.) Collision Sense, Multiple Access with Carrier Detection D.) Carrier Sense, MAC address with Collision Detection
During encapsulation, in which order is information packaged? A. Data, Packet, Segment, Frame B. Segment, Data, Packet, Frame C. Data, Segment, Packet, Frame D. Packet, Data, Segment, Frame E. Frame, Data, Segment, Packet F. Bread, Peanut Butter, Jelly, Bread
Explain the difference between baseband and broadband transmission in ccna?
Define topology?
Hi, Shahin Thanks a lot for providing me these sites. These links are really helpful for me. r u working somewhere please let me know
Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) DDP E.) Ethernet
Identify the 2 characteristics regarding MAC addresses? A.) Contains a network portion and host portion B.) Always assigned by System Administrator C.) 48 bits long D.) Contains a vendor code and serial number
Does a bridge divide a network into smaller sections?