Extended IP access-lists (100-199) can be used to control
traffic.
Which command listed below will permit smtp mail to only
host 3.4.5.6 ?
A.) It is not possible for SMTP traffic
B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp
C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23
D.) access-list 102 permit tcp any any eq smtp
E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply
What is a protocol
Which of the following are solutions to the problems encountered with Distance-Vector routing? A.) Defining a Maximum B.) Poison Reverse C.) Triggered Updates D.) Shortest path first algorithm. E.) Split Horizon
When written <cr > what does it mean?
Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191 D.) 1 - 191
What causes a triggered update to reset the router hold-down timer?
As a system administrator, you want to debug igrp but are worried that the "debug IP igrp transaction" command will flood the console. What is the command that you should use? A. debug IP igrp event B. debug IP igrp-events C. debug IP igrp summary D. debug IP igrp events
Which of the following will apply IPX sap access list 1010 for incoming traffic, assume you are at the interface configuration? A.) ipx input-sap-filter 1010 in B.) ipx input-sap-filter 1010 C.) ipx access-group 1010 in D.) ipx access-list 1010 in
How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode
Identify command that configures 'Cisco1' as a secret password? A.) Router(config)# enable secret password Cisco1 B.) Router(config)# enable secret cisco1 C.) Router(config)# enable password Cisco1 D.) Router(config)# enable secret Cisco1
What purpose does aging serve in a link state protocol?
What are two characteristics of the RARP protocol? (Choose two) A. it generates parameter problem messages B. it maps IP addresses to Ethernet addresses C. it maps Ethernet addresses to IP addresses D. it is implemented directly on top of the data link layer