Identify the command to configure the configuration-register?
A.) Router# config-register 0x2102
B.) Router(config)# config-register 0x2102
C.) Router(config-reg)# 0x2102
D.) Router> config-register 0x2102
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
Can anybody tell me how to configure a cisco router?
Identify the command mode necessary to enter the extended ping command? A.) Router# B.) Router> C.) Router(config)# D.) Router(ext-ping)#
How network gateway is different from routers?
In stp which protocol is used for detrming root port root bridge ,forwarding port and blocking port
Identify the command to reload the router? A.) Router(config)# reload B.) Router# reset C.) Router# reload D.) Router> reload
What is the Difference between Hub and Switch?
what is farme realy.and on which layer it work
What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
Which two of the following are valid ways to have multiple encapsulation types on a single interface? A.) This is not possible B.) subinterfaces C.) additional physical interfaces D.) secondary addresses