Identify the command to display the status of the Frame Relay
virtual circuit?
A.) Router# show frame-relay virtual-circuit
B.) Router(config)# show frame-relay pvc
C.) Router# show frame-relay pvc
D.) Router# show virtual
What is Spanning Tree Protocol and how it work? I know it is - STP is Spanning tree Protocol. It Stops the looping in the network? How STP work? How it stop Looping in network?
which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance
What purpose does aging serve in a link state protocol?
A router blocks ___________ Broadcasts Unicasts All packets Nothing
Identify the command that configures the bandwidth to 56K? A.) Router(config-if)# bandwidth 56000 B.) Router(config-if)# bandwidth 56k C.) Router(config)# bandwidth 56 D.) Router(config-if)# bandwidth 56
What’s the default CDP holdtime in seconds for Cisco routers?
Which two statements about frame tagging are true? (Choose two) A. A filtering table is developed for each switch. B. Frame tagging assigns a unique user defined ID to each frame. C. A unique identifier is placed in the header of each frame as it is forwarded between switches. D. Frame tagging is a technique that examines particular information about each frame based on user defined offsets.
The ICMP (referred to in PFC 1700) is implemented by all TCP/IP hosts A. true B. false
What are two ways IPX supports multiple logical networks on an individual underrate? (Choose two) A. network number B. routing protocol C. encapsulation type D. autonomous system number
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
what is lmi? how many type of lmi's we are using ...