Extended IP access-lists (100-199) can be used to control
traffic.
Which command listed below will permit smtp mail to only
host 3.4.5.6 ?
A.) It is not possible for SMTP traffic
B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp
C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23
D.) access-list 102 permit tcp any any eq smtp
E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
When we do default route?
Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
What are the different types of passwords used in securing a CISCO router?
UDP works at which layer of the DOD model? A.) Internet B.) Host-to-Host C.) Transport D.) Data Link
What is the administrative distance for RIP? A.) 100 B.) 90 C.) 120 D.) 110
Which of the following will apply IPX sap access list 1010 for incoming traffic, assume you are at the interface configuration? A.) ipx input-sap-filter 1010 in B.) ipx input-sap-filter 1010 C.) ipx access-group 1010 in D.) ipx access-list 1010 in
What is the difference between arp and rarp?
Identify the command that will display the RIP routes entering and leaving the router? A.) Router(config)# debug ip rip B.) Route# debug ip rip C.) Router>debug ip rip D.) Router# debug rip routes
Which command will enable debugging for IPX RIP updates? A.) debug ipx B.) debug ipx rip C.) debug ipx rip activity D.) debug rip E.) debug ipx packets
How does OSPF calculate its Metric
hi friend i am sending some interview question which is asked from me at volvo hope this will help you of all 1 what is mpls al question is posted by jitendera kumar sinha
0 Answers ALU, TATA, Volvo, Wipro,
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer