What command do you enter at the keyboard to begin a user mode
session?
A.) Type 'CTRL-P'
B.) Type 'login'
C.) Just press .
D.) Type 'enable'
E.) Press 'Shift + Ctrl + 6' at the same time.
Tell me when we use extended access-list?
What is the default encapsulation and frame type on an Ethernet interface when enabling Novell? A.) SNAP B.) Ethernet_II C.) 802.2 D.) 802.3 E.) SAP F.) Novell-ether
Which two of the following are valid ways to have multiple encapsulation types on a single interface? A.) This is not possible B.) subinterfaces C.) additional physical interfaces D.) secondary addresses
How does Hold-downs work?
CO is an acronym for which of the following? A.) Central Office B.) Capital Office C.) Central Operator D.) Company Office
What are the different types of VPN?
Why we choose the router rather then L-3 Switch
8 Answers Network Solutions, Wipro,
What is the purpose of the DLCI? A.) Identifies the remote routers B.) Contained with a 802.2 frame for routing purposes C.) Used with PPP during authentication D.) Identifies the PVC in a Frame Relay network
Which layer defines the physical topology? A.) Application B.) Transport C.) Network D.) Data Link E.) Physical F.) Session
Which statement should you use to deny FTP access (only) from network 210 93 105 0 to network 223 8 151 0? A. access list 1 deny 210 93 105 0 0 0 0 0 any eq ftp access list 1 permit any B. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp C. access list 100 deny ip 223 8 151 0 0 0 0 255 any eq ftp access list 100 permit hp any any D. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp access list 100 permit ip any any
Explain why is udp lease favored when compared to tcp?
Which of the following is an example of the Network Layer? A.) LLC B.) SQL C.) Token Ring D.) IPX E.) SPX