Which can be logged by IPX extended access lists?
A.) source address
B.) protocol
C.) source socket
D.) access list number
E.) destination socket
F.) destination address
Answer / guest
Answer: A B C D E F
All of the above can be logged by IPX extended access lists.
| Is This Answer Correct ? | 1 Yes | 0 No |
Can anyone explain the Split Horizon rule in RIP & also Split Horizon with Poison reverse. Jitu.... U knw wat i expect.. hehehehehe...
Tell me which protocol comes under hybrid dynamic type?
What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+P
Routers that have Flash memory typically have a ore loaded copy of place IOS software. Which command should you use to make a backup copy of the software image onto a given network server? A. copy flash tftp B. save copy to tftp C. write backup tftp D. write, backup -server-name- E. copy backup to -server-name-
Identify the 3 methods routers learn paths to destinations? A.) Dynamic routing B.) None of the above, configured by default C.) Default routes D.) Administrative distance E.) Static routes
LMI operates between the Frame Switch and what other device? A.) CPE device B.) Another Frame Switch C.) X.25 switch D.) Novell File Server
You want to enable both arpa and snap encapsulation on one router interface. How do you do this? A. The interface can handle multiple encapsulation types with no extra configuration. B. Assign two network numbers, one for each encapsulation type. C. Enable Novell-ether to run multiple encapsulation types. D. Both arpa and snap are enabled by default so you don't have to configure anything.
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
Define class full protocol?
Which statement about Ethernet networks is true? A. The advantage of a full duplex is the ability to transmit data over 111 cable B. Full duplex Ethernet requires a point-to-point connection when only two nodes are present C. Ethernet switches can use full duplex mode to connect multiple nodes to a single pod of a switch D. Half duplex is a cut through packet processing method that is vow fast little error correction Full duplex is a store and forward method that is slower but has better error correction
If you are in IOS user mode, which command do you use to enter the privileged mode? A. Set B. Enable C. Configure D. Privileges
Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0