Identify the effect of Ctrl-Z?
A.) Exits back to privileged exec mode
B.) Disconnect from the router
C.) Abort the ping operation
D.) Exits privileged exec mode
In order to configure a Frame Relay subinterface with IP identify the 2 commands that must be configured on the physical interface? A.) Router(config-if)# encapsulation frame-relay B.) Router(config-if)# no ip address C.) Router(config-if)#encapsulation subinterface frame-relay D.) Router(config)# subinterface s0 encapsulation frame-relay
Two of the protocols that can be carried in the Protocol field of an IP packet are? A. TCP B. UDP C. FTP D. TFTP
Can you explain static and dynamic tunnels?
How many types of ends in wan?
Which information must a router know in order to perform proper and pungent routing? A. destination application of an incoming packet B. number of other packets in a single flow of data C. destination network address of an incoming packet D. number of routers that also know a path to the destination
Tell me which protocol works only on cisco routers?
What is a key use of a device hardware address? A. to obtain a vendor code / serial number from the user B. to transmit a frame from one Interface to another Interface C. to transmit a packet from one local device to another local device D. to transmit data from one local device to a remote device across the internet E. to contain logical information about the device to use for end-to-end transmission
What is switch priority & why it is used????
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
How many subnets can be gained by subnetting 172.17.32.0/23 into a /27 mask, and how many usable host addresses will there be per subnet?
Which protocol resolves an IP address to a MAC address? A.) DHCP B.) RARP C.) ARP D.) NBP E.) DNS
frends i am suffring from newfolder.exe virus in my server 2000 win how i have to remove it plz help me Jitendera sinha