How do you disable advanced editing?
A.) terminal editing
B.) terminal no editing
C.) disable editing
D.) no terminal editing
Which of the following are examples of the Transport Layer? A.) SQL B.) UDP C.) IP D.) LLC E.) ARP
You have OSPF traffic flooding your network via one of your router interfaces. Write the access list line that will deny all ospf traffic. Don't worry about the other lines of the access list.
IP RIP routing is conferred on a router but not all interfaces attach to RIP networks. What should you use to prevent all RIP routing updates from being sent through selecedc interfaces without using access lists? A. passive route B. default routes C. passive interface D. route update filtering
Which statement about the Committed Information Rate (CIP) is true? A. It is the rate in bits per second at which the Frame Relay switch agrees to transfer data B. It is the clock speed (pod speed) of the connection (local loop) to the Frame Relay cloud C. It is the maximum number of bits that switch can transferduring any Committed Rate Measurement Interval D. It is a signaling standard between the 3PE device and FP switch. It is responsible for managing the connection and maintaining status between the devices.
What is the different between console port and auxiliary port?
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI
What is the network brouter?
How much internal and external ad of eigrp protocol?
Which layer is responsible for synchronizing sending and receiving applications? A.) Presentation B.) Session C.) Transport D.) Application E.) Network
Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connnection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.
On a network design project you determine that a new testing application requires multiple hosts. These hosts must be capable of sharing data between each host and an enterprise server at 10 Mobs bandwidth. Other divisions in the company use applications that require less than 2 Mobs bandwidth of the enterprise server. What is your most economical recommendation? A. That existing 10BaseT hubs be replaced with 1 00BaseT hubs to improve overall performance B. That a router can separate the testing application from the rest of the network, thus allowing the testing application more bandwidth. C. That a switch be installed, so that the enterprise server can be provided a 100 Mobs pod and each of the testing application hosts can be given dedicated 10 Mobs pods] D. That a bridge be placed between the enterprise server and all other users with the exception of the testing application