Which command listed below sets the banner message when someone
connects to the router?
A.) message #
B.) banner #
C.) login banner #
D.) description #
E.) login description #
F.) banner motd #
Answers were Sorted based on User's Feedback
How many voltage that passes through the ISDN?
4 Answers CTS, Swirl Infosystems,
LMI operates between the Frame Switch and what other device? A.) CPE device B.) Another Frame Switch C.) X.25 switch D.) Novell File Server
What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic
Write the procedure for Router for configuring DHCP?
Which service uses telephone control messages and signals between the transfer points along the way to the called destination? A. Signaling System 7 (SS7) B. Time-division Multiplexing (TDM) C. X.25 D. Frame relay
Hi Everyone,i have done b.e. and i am CCNA certified, i am searching jobs related to ccna. Although i don't have experience in networking field, i found very difficult to search job(posted my resume in all job portals). I am very much interested to work in networking field, please guide me, my mail id: karnailthakur@gmail.com; Please let me know any company taking ccna freshers(Preferably delhiNCR location). Thanks guys...
Identify the extended IP access-list number range? A.) 600 - 699 B.) 1 - 99 C.) 900 - 999 D.) 100 - 199
Hi Friend. i have to let you know that now i have been selected for cisco india in bangalore. i am thanking to all of you guys that u have been posted such good question and the respective answer. from today i will be not able to visit this site on regular basic and hopeing that you will continue to post the question.the question you are posting is not very usefull to you but also usefull to another. i am again thanking to all of you and hope for best for your feature. Jitendera kumar sinha Network engineer-L2 cisco india Bangalore
Which encapsulation methods are most commonly used with dialup Integrated Services Digital Network (ISDN)? A. IP and IPX B. IP and PPP C. PPP and SDLC D. PPP and HDLC
The following selections show the command prompt and the configuration of the IP network mask. Which two are correct? A. Router#term IP netmask-format { bitcount | decimal | hexadecimal } B. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } C. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal } D. Router#ip netmask-format { bitcount | decimal | hexadecimal }
When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.
Which protocol will send a message to routers if a network outage or congestion occurs? A.) ARP B.) TCP C.) IP D.) ICMP