Identify the command that forces the router to load into ROM
mode
upon a reload?
A.) boot system rom
B.) rom boot
C.) boot system flash rom
D.) boot router rom
Identify the 3 major functions at layer 3 of the OSI model? A.) Forwarding process B.) Logical addressing C.) End-to-end connections D.) Path selection E.) MAC address examination F.) Network monitoring
Which OSI Reference Layer is concerned with path determination? A.) Datalink B.) Physical C.) Network D.) Transport E.) Session
hi im ccna certified im searching 4 job in networking domain can any guide wats the rite way of job approach ,wat r the rite sites for searching job im eagerly 4 ur replies
what is difference between hub and switch?
The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.) Presentation C.) Network D.) Datalink E.) Session F.) Transport
Identify the command to determine if CDP is enabled? A.) show enable cdp B.) show cdp enabled C.) show cdp run D.) show cdp
Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically connected network(s) B.) Configure the classful address, no subnets C.) Enable CDP so neighbors can be detected D.) Configure all networks in Area0
Which IP host address range is allowable given an IP address of 172.37.2.56 and 12 bits of subnetting A. 172.37.2.48 to 172.37.2.63 B. 172.37.2.48 to 172.37.2.62 C. 172.37.2.49 to 172.37.2.62 D. 172.37.2.49 to 172.37.2.63 E. 172.37.2.55 to 172.37.2.126
what is 5-4-3 rule?
Identify the purpose of ICMP? A.) Avoiding routing loops B.) Send error and control messages C.) Transporting routing updates D.) Collision detection
Identify the command that displays the SAP table? A.) show ipx servers B.) display SAP table C.) display SAP's D.) show sap table
Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon