Identify the command that forces the router to load into ROM
mode
upon a reload?
A.) boot system rom
B.) rom boot
C.) boot system flash rom
D.) boot router rom
what is difference between designated router and backup designated router and explain feature of both router.
Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connnection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding
Using the access-list command, 'access-list 1 deny 2.2.2.2', what else must be done to stop host 2.2.2.2 from sending any traffic out of physical interface E0, while still allowing other traffic? A.) In global mode, Add a line - 'access-list 1 permit 0.0.0.0 255.255.255.255' B.) On interface E0, Add a line - 'access-group 1 in' C.) In global mode, Add a line - 'access-list 1 permit all' D.) On interface E0, Add a line - 'access-list 1 in' E.) On interface E0, Add a line - 'access-list 1 out' F.) On interface E0, Add a line - 'ip access-group 1'
Identify the switching method that receives the entire frame then dispatches it? A.) Cut-through B.) Receive and forward C.) Store and forward D.) Fast forward
Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport
Which protocol switch use for filling its mac-table?
CO is an acronym for which of the following? A.) Central Office B.) Capital Office C.) Central Operator D.) Company Office
What is STP and what is the difference between PVST and RSTP
Identify IPX GNS and it's purpose? A.) Go Network Server - sends a print job to a network server B.) Get Nearest Server - locate the nearest server C.) Guaranteed Network Services - allocates resources to users D.) Get Notes Server - locates Domino Server
Identify 2 transport layer protocols? A.) IP B.) TCP C.) CDP D.) ARP E.) UDP
Explain what is formula of hold down time of eigrp protocol?
Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list