What utility can you use to see the path a packet takes
through an
internetwork?
A.) Route
B.) SNMP
C.) Trace
D.) Ping
Answers were Sorted based on User's Feedback
Answer / guest
Answer: C
Trace - Uses Time-To-Live (TTL) values to generate messages
from each
router used along the path. This is very powerful in its
ability to
locate failures in the path from the source to the destination.
| Is This Answer Correct ? | 3 Yes | 0 No |
If you are running Token Ring with Novell IPX routing, which encapsulation should you use? A.) SAP B.) SNAP C.) 802.5 D.) 802.2
what is telnet,ssh?? what is the perpose of this? wer r this configured and how to configured??
The Datalink Layer is broken down into 2 layers, LLC and MAC. The LLC establishes media independence and what else? A.) Provides Windowing. B.) Provides flow control. C.) Provides SAP's (Service Access Points). D.) The Datalink layer does not have sublayers. E.) Provides SAP's (Service Advertising Protocol). F.) RIP Updates.
Explain some overview of EIGRP?
What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+P
Company XYZ has an employee that works out of the home. The employee runs big client server applications and must quickly transfer large files. The company wants the best cost/benefit on this connection. What would be the most practical solution? A. an ISDN Basic Rate Interface (BRI) connection to the user at home B. a dedicated T1 connection to the user at home C. a dedicated Frame Relay connection to the user at home D. a standard 28.8 analog dialup connection to the user at home
can we measure how much a host exact bandwidth using by a network cable which is communicating over the network? options: 1- via Router 2- Switch, 3- other device... if yes.. then how ( with every option)
Using the TCP/IP protocol suite a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses RARP requests D. It uses a router lookup table
What is the size of ipv6?
what is a malicious router?when it occurs? what is a malicious pacekt ?when it occurs?
Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in
why we assingn the wild card mask in the use of ospf and access list.