Which 3 statements describe default encapsulation and LMI type
configuration?
A.) There are only four encapsulations and 3 LMI type options
B.) The LMI type config term options
C.) In release 11.3 the LMI type is autosensed
D.) The default LMI is Cisco
E.) IETF encap must be configured unless the connecting
routers are both
cisco
Answer / guest
Answer: C D E
The above 3 statements best describe default encapsulation
and LMI type
configuration for Cisco routers.
| Is This Answer Correct ? | 2 Yes | 1 No |
What is the size of ipv4?
raid can be used in? 1 NT 2 Netware 3 all of above mine answer -NT
Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not a the same time
In the command "router igrp 109" what does 109 signify? A. an autonomous system B. any network number which the router is attached to C. the allowable length of the routing table D. the network socket number
Which of the following is True regarding passwords on a Cisco router? A. All passwords can be encrypted B. All passwords can be entered using the set-up dialogue C. A password can be set before a user can enter the privileged mode D. A password can be set for individual lines E. TACACS or Radius password authentication can be used.
Identify the command to configure the IP address 172.16.100.5 255.255.255.0? A.) Router(config-if)# ip address 172.16.100.5 255.255.255.0 B.) Router(config)# ip address 172.16.100.5 C.) Router# ip address 172.16.100.5 255.255.255.0 D.) Router(config)# ip address 172.16.100.5 255.255.255.0
What does the meaning of interface 0/0?
what is the difference between eigrp and ospf
In how many ways can data be transferred in ccna?
Explain the terms unicast, multicast, broadcast and multicast.
Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery
Can you explain the difference between trusted and untrusted networks?