In version 11.2 of the IOS, a Cisco router configured for
frame-relay can automatically detect the LMI type. What is
this known as?
A.) Psychic
B.) ESP
C.) Inverse ARP
D.) Hello
E.) Reverse ARP
F.) Autosense
Answers were Sorted based on User's Feedback
Answer / guest
Answer: F
Autosense allows the router to determine which LMI type the
frame relay
switch is using. Options include CISCO, ANSI, and Q933A.
| Is This Answer Correct ? | 3 Yes | 0 No |
Answer / sam
reverse arp can be automatically detect mac address
| Is This Answer Correct ? | 0 Yes | 0 No |
What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging
Which layer allows multiple Ethernet devices to uniquely identify one another on the Datalink layer? A.) Transport B.) Session C.) Network D.) Datalink - MAC Sublayer E.) Datalink - LLC Sublayer
What are the job opportunities i will get once i complete my CCNA certification.
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion
Which command verifies encapsulation as well as Layer 1 and Layer 2 statistics on a router configured for Frame Relay? A. show ip B. show interface C. show statistics D. show frame-relay
Which protocol works at the Internet layer and is responsible for making routing decisions? A.) UDP B.) IP C.) TCP D.) ARP
What is an advantage of local area network (LAN) segmentation? A. smaller collision domains B. elimination of broadcasts C. decreased cost of implementation D. larger number of users within the same domain
Identify the command to display the Frame Relay map table? A.) Router# display frame-relay map B.) Router# show frame-relay map C.) Router(setup)# show frame-relay map D.) Router# show map frame-relay
Which types of packets used in EIGRP?
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process
Can you explain how L2F data tunneling process works?
What are the different types of passwords used in securing a CISCO router?