Which of the following would be displayed by the command
'SHOW CDP
NEIGHBOR DETAIL'?
A.) The incoming/outgoing port.
B.) The hardware platform.
C.) One address per protocol.
D.) Amount of Flash Memory Available
E.) The routers hostname.
F.) The subnet mask, if IP is configured.
Answer / guest
Answer: A B C E
CDP shows a lot of the same info that 'show version' does
locally, but
FLASH memory is not part of it. The 'detail' keyword is
optional, but
even when used, IP subnet mask information is not displayed
by CDP for
IP interfaces.
| Is This Answer Correct ? | 0 Yes | 0 No |
Explain how many types of router?
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments
Which classes are assignable?
Which two statements about a bridge are true? (Choose two) A. A bridge floods multicasts B. A bridge floods broadcasts C. A bridge does not flood multicasts D. A bridge does not flood broadcasts
what is frame relay.and how it is different from isdn
plz send me cisco contact no india?
Identify the command mode necessary to enter the standard ping command? A.) Router(config)# B.) Router> C.) Router(std-ping)# D.) Router(config-if)#
A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel
A ISDN PRI circuit can be described as which of the following? A.) 24 B channels and 1-64Kbps D channel B.) 23 B channels and 1-64Kbps D channel C.) 2-D channels and 1-C channel D.) 2-64Kbps B channels and 1-16Kbps D channel
How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode
What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.
Identify 3 IP applications? A.) AURP B.) ARP C.) Telnet D.) SMTP E.) DNS F.) RARP