Identify the 4 that are WAN technologies?
A.) HDLC
B.) FDDI
C.) 802.5
D.) HSSI
E.) SDLC
F.) Frame Relay
Answers were Sorted based on User's Feedback
Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically connected network(s) B.) Configure the classfull address, no subnets C.) Enable CDP so neighbors can be detected D.) Same autonomous network
What will be the prefix length of 224 in vlsm?
Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP
What is syntax of ipv4?
What are the differnt memory use in cisco router?
When configuring the subnet mask for an IP address, which formats can be used?A. dotted-decimal. B. Hexadecimal C. Bit-count D. Octal E. Binary
Identify 3 IP routing protocols? A.) RIP B.) AURP C.) OSPF D.) IGRP E.) ARP F.) ICMP
You have typed "ping" 172.16.101.1 and get the following display: Type escape sequence to abort. Sending 5, 100-byte ICMP Echoes to 172.16.101.1, timeout is 2 seconds: .!!!! What does the "." signify? A. That one message timed out. B. That all messages were successful. C. That one message was successful. D. That one message completed in under the allotted timeframe.
srry for inconvnce ..here is complete qs...ignore the previous 1 3 router configured with RIP & Ripv2 rotuer 1- connected with router 2 having sr ip 10.0.1.2 routing : ripv2 E0:192.168.1.10 router 2: connected with router 1 and router 3 having sr 0 ip 10.0.1.3 & sr 1 ip 11.0.1.2 routing :rip & ripv2 E0=192.168.10.2 router 3: connected with router 2 having sr ip 11.0.1.3 routing: rip E0=172.16.10.2 is there communication possible?
5. What is an advantage of using routers in your network? (Choose all that apply) A. Stops broadcast storms B. Reduces downtime on your network C. Creates internetworks D. Can filter by logical address
Describe End to End network services: (Choose all that apply) A.) Best Route selection B.) Accomplished Segment by Segment, each segment is autonomous C.) Flow Control & Data Integrity D.) Best efforts packet delivery
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port