How do you disable advanced editing?
A.) terminal editing
B.) terminal no editing
C.) disable editing
D.) no terminal editing
Put the following steps of encapsulation into the correct order: 1) The data is broken into segments to be organized 2) Frames are converted to 1s and 0s to be put on the wire 3) Packets are converted into frames 4) Information that users enter is converted into data 5) The segments are changed to packets to be routed A.) 4, 1, 3, 2, 5 B.) 4, 5, 1, 3, 2 C.) 2, 3, 1, 4, 5 D.) 4, 1, 5, 3, 2
What is the minimum request timer?
Bridges work at what layer of the OSI model? A.) Data Link B.) Network C.) Physical D.) Application
12 Answers KVS, PGT,
Which peer authentication method and which ipsec mode is used to connect to the branch locations?
Can you explain how L2F data tunneling process works?
How many types of IP routings?
14 Answers CK, TCS,
Default packet size of ipv6?
If a router uses static routing, how does it learn the route to remote networks? The router uses a RIP request to obtain remote network numbers. The router uses a routing protocol to exchange remote network numbers. The router uses DNS request packets to obtain remote network numbers. The Network Administrator manually configures the remote networks.
IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address
What is the IP extended access list range? A.) 1000-1099 B.) 100-199 C.) 1-99 D.) 101-200
Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it
Identify 2 features of X.25? A.) Supports only IP B.) Utilizes switched and permanent virtual circuits C.) Contains minimal flow control and error recovery D.) Utilizes LAPB as it's data-link protocol