What utility can you use to see the path a packet takes
through an
internetwork?
A.) Route
B.) SNMP
C.) Trace
D.) Ping
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
Trace - Uses Time-To-Live (TTL) values to generate messages
from each
router used along the path. This is very powerful in its
ability to
locate failures in the path from the source to the destination.
| Is This Answer Correct ? | 3 Yes | 0 No |
Hey Folks how are you i guess some of guys are newly visitors of this site so let me introduce my self. I am jitendera kumar sinha working for cisco system (india)( Network engineer L2) and i was also a regular Visitors of this site and i have provided lots of answer and i do not know how many are correct :-) By the way i am here again to learn some thing and share my knowledge which is beyond CCNA Scope and and it is some where related to ccnp ( switching )and ccnp Security as i am pursuing ccnp security so i am going to start the topics from switching and will share my knowledge and try to brush-up my knowledge.... so let me know any topic in switching where you are facing difficulty and i will try to solve it so please post one topic and i will reply weekly as i am getting time on Sunday only
Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1
Why ip address called logical address?
What is the Difference between Switch and Bridge?
What utility can you use to see the path a packet takes through an internetwork? A.) Route B.) SNMP C.) Trace D.) Ping
Identify the keystroke to position the cursor to the beginning of a command line? A.) Ctrl-A B.) Ctrl-Ins C.) Ctrl-B D.) Ctrl-Z
Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, the router enters in its table the number 16 to signify destination unreachable
Why we using Tcp/IP. Why we can't use just Tcp ip? What is the meaning of '/' symbol in between this?
Which two statements about integrated services digital network (ISDN) are true? A. ISDN provides data only capability B. ISDN provides an integrated voice/data capability C. The ISDN standards define the hardware and call setup schemes for end the end digital connectivity D. Users receive more bandwidth on WANS with a leased lin of 56 Cops than with multiple B channels
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
What is icmp protocol?