Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which of the following are examples of ICMP?

A.) Traceroute

B.) Web Browsing

C.) Ping

D.) Telnet

E.) Destination Unreachable message from a router

F.) Inverse Tunnels



Which of the following are examples of ICMP? A.) Traceroute B.) Web Browsing C.) Ping D...

Answer / guest

Answer: A C E

Ping and Traceroute are used by ICMP for Testing.

Destination Unreachable messages are generated by a router
when it does

not have a route to the network.

Is This Answer Correct ?    6 Yes 0 No

Post New Answer

More CCNA Interview Questions

Define ios?

0 Answers  


Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) Privileged exec is a subset of the user exec mode C.) They both require the enable password D.) User exec is a subset of the privileged exec mode

1 Answers  


what are the 3ree way for implementing vlan on cisco switches what is the layer hierarchy of the cisco what is the best place of implementing standard access list what is q stand for isdn these are the challanging question for me i am waiting for jitendera sinha answer(it is challenge for u i have seen lots of answer given by u )it is a challenge in the frendshipmode plz donot take other wise

2 Answers  


Can you explain how L2F data tunneling process works?

1 Answers   CCIE,


When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised

8 Answers   Wipro,


Which of the following encapsulation types can be used on leased-line connections? (Choose two) &#10061; A. HDLC &#10061; B. Frame Relay &#10061; C. ISDN &#10061; D. PPP

10 Answers   Wipro,


In stp which protocol is used for detrming root port root bridge ,forwarding port and blocking port

1 Answers   IBM,


Mention what is the difference between dynamic ip and static ip addressing?

0 Answers  


Can 2 different VTP Domain Communicate. if yes then How.

7 Answers  


Which IP address and wildcard mask would you use in your ACL to block all the hosts in the subnet 192.168.16.43/28?

2 Answers   Siemens,


What two types of PPP data compression are available using Cisco IOS? A.) Predictor B.) DoubleSpace C.) Stacker D.) PAP E.) ZIP F.) CHAP

2 Answers  


what is the difference between eigrp and ospf

6 Answers   IBM, Wipro,


Categories