Identify 3 feature of access-lists?
A.) Implicit deny will deny any packets not matched
B.) Processed sequentially from bottom to top
C.) Processed sequentially from top to bottom
D.) If a packet is denied it would be tested against the
remaining
statements in the access-list
E.) Once a match is made the packet is either denied or
permitted
F.) Enabled on all interfaces by default
Answer / guest
Answer: A C E
Access-list are processed from top to bottom, once a match
occurs the
packet is either denied or permitted and is no longer tested
and if no
match occurs the packet is denied via the implicit deny.
| Is This Answer Correct ? | 3 Yes | 0 No |
Which three basic switch functions increase available bandwidth on the networks? (Choose three) A. loop avoidance B. address learning C. hop count limiting D. broadcast filtering E. packet forward/filtering
Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
What is Route Poisoning?
what is frame realay.is it a circit switching technolgy if no then what technolgy it used
What is DLCI?
A router blocks ___________ Broadcasts Unicasts All packets Nothing
Which of the following do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE
Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport
When we use loop back ip?
Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share
Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session