Which of the following are valid Cisco encapsulation type names?
A.) arpa = IPX Ethernet
B.) novell-ether = IPX Ethernet_802.3
C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring
D.) novell-fddi = IPX Fddi_Raw
E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring
F.) hdlc = HDLC on serial interfaces
Which is true regarding store-and-forward switching method? A.) Latency varies depending on frame-length B.) Latency is constant C.) It is default for all Cisco switches D.) It only reads the destination hardware address before forwarding the frame
Which two statements about a bridge are true? (Choose two) A. A bridge floods multicasts B. A bridge floods broadcasts C. A bridge does not flood multicasts D. A bridge does not flood broadcasts
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session
What is difference between routing and routed protocols?
Which Distance Vector characteristic can help to speed up convergence? A.) Triggered Updates. B.) Split Horizon. C.) Poison Reverse. D.) Hold Down timers. E.) Inverse ARP.
You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet
Which command displays access list 111? A. show access-list 111 B. show ip access-list 111 C. display ip access-list 111 D. display access-list 111 details
Which type of switching reads in the entire frame before forwarding it? A.) Tabling B.) Store-and-Forward C.) Inverse ARP D.) Fast Forward E.) Cut-Through F.) Routing
what is the full fom of ping
What must be true for two Routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D)Configured for PPP
Which port are used by Viruses? TCP or UDP?