When setting up a frame-relay network between a Cisco router
and a
non-Cisco router, what encapsulation type should you use?
A.) SAP
B.) CISCO
C.) IANA
D.) Apollo
E.) IETF
F.) Q933A
Answers were Sorted based on User's Feedback
Answer / guest
Answer: E
The Internet Engineering Task Force (IETF) encapsulation
method is the
standard encapsulation type for Frame Relay. Cisco routers
default to
the CISCO encapsulation method, because it was created
before there was
a standard.
Is This Answer Correct ? | 2 Yes | 0 No |
which term use to allow user to conect the remote n/w with ppp dail up conection ras sap sonet mane answer rsa
Utilizing RIP, what is the limit when it comes to the number of hops?
An user from the LAN is able to ping the default gateway of the router and other sites in the internet. but not able to ping only the google site, no acc list configured and no firewall and no problem with DNS atall. What may be the problem with router?
Explain the difference between static and dynamic routing?
Which command will enable debugging for IPX RIP updates? A.) debug ipx B.) debug ipx rip C.) debug ipx rip activity D.) debug rip E.) debug ipx packets
What information is provided by the local management interface (LMI)? A.) LMI encapsulation type B.) The current DLCI values C.) The status of virtual circuits D.) The global or local significance of the DLCI values
Why Operating System Have only 65,535 port Numbers
How many types of ethernet?
The -- terminal no editing -- command will perform what function? A.) Edit the contents of NVRAM B.) Allows access to the terminal port C.) Stops the advanced editing feature D.) Enable password functions
The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.) Presentation C.) Network D.) Datalink E.) Session F.) Transport
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI
Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged the are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination