When setting up a frame-relay network between a Cisco router
and a

non-Cisco router, what encapsulation type should you use?

A.) SAP

B.) CISCO

C.) IANA

D.) Apollo

E.) IETF

F.) Q933A

Answers were Sorted based on User's Feedback



When setting up a frame-relay network between a Cisco router and a non-Cisco router, what encaps..

Answer / guest

Answer: E

The Internet Engineering Task Force (IETF) encapsulation
method is the

standard encapsulation type for Frame Relay. Cisco routers
default to

the CISCO encapsulation method, because it was created
before there was

a standard.

Is This Answer Correct ?    2 Yes 0 No

When setting up a frame-relay network between a Cisco router and a non-Cisco router, what encaps..

Answer / suresh

e

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

which term use to allow user to conect the remote n/w with ppp dail up conection ras sap sonet mane answer rsa

1 Answers  


Utilizing RIP, what is the limit when it comes to the number of hops?

0 Answers  


An user from the LAN is able to ping the default gateway of the router and other sites in the internet. but not able to ping only the google site, no acc list configured and no firewall and no problem with DNS atall. What may be the problem with router?

8 Answers   Satyam,


Explain the difference between static and dynamic routing?

0 Answers  


Which command will enable debugging for IPX RIP updates? A.) debug ipx B.) debug ipx rip C.) debug ipx rip activity D.) debug rip E.) debug ipx packets

2 Answers  






What information is provided by the local management interface (LMI)? A.) LMI encapsulation type B.) The current DLCI values C.) The status of virtual circuits D.) The global or local significance of the DLCI values

1 Answers  


Why Operating System Have only 65,535 port Numbers

5 Answers  


How many types of ethernet?

0 Answers  


The -- terminal no editing -- command will perform what function? A.) Edit the contents of NVRAM B.) Allows access to the terminal port C.) Stops the advanced editing feature D.) Enable password functions

1 Answers  


The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.) Presentation C.) Network D.) Datalink E.) Session F.) Transport

3 Answers  


Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI

1 Answers  


Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged the are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination

1 Answers  


Categories