What command do you enter at the keyboard to begin a user mode
session?
A.) Type 'CTRL-P'
B.) Type 'login'
C.) Just press .
D.) Type 'enable'
E.) Press 'Shift + Ctrl + 6' at the same time.
When setting up a frame-relay network between a Cisco router and a non-Cisco router, what encapsulation type should you use? A.) SAP B.) CISCO C.) IANA D.) Apollo E.) IETF F.) Q933A
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI
What are four functions/characteristics of the network layer of the OSI model? (Choose four) A. It uses a two-part address B. It maintains routing tables C. It uses broadcast addresses D. It establishes network addresses E. It provides access to the LAN media F. It provides media independence for upper layers G. It provides path selection for Internetwork communication
When using RIP, routing updates are broadcast every ____ seconds. A. 30 B. 10 C. 60 D. 90
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
Can anyone explain the STP Security features. Just like BPDU guard, Root Guard. Hi JITENDERA, i m specially looking for u?????
What is loop back ip in ipv6?
Which OSI layer establishes, maintains and terminates sessions between applications? A.) Application B.) Physical C.) Data-Link D.) Presentation E.) Network F.) Session
Switching methods include cut-through, store and forward, and a modified version of the first two methods. Which statement about switching methods is true? A. The store and forward method has low latency B. The cut through method of switching has high latency C. The modified version holds the packet in memory until 50 percent of the packet reaches the switch D. The modified version holds the packet in memory until the data spoon of the packet reaches the switch
In how many ways you can access the router?
In distance-vector routing, there is a problem known as the 'count to infinity' problem. What is the most direct solution to this? A.) Defining a Maximum. B.) You can not solve the 'count to infinity' problem with a distance vector protocol. C.) Poison Reverse. D.) Triggered Updates. E.) Split Horizon.
Identify the X.25 addressing standard? A.) X.121 B.) X.25a C.) ITU-1 D.) Q933a