Identify the 2 types of access-list filters that control SAP
traffic?
A.) Novell-ether
B.) Arpa
C.) Input-sap-filter
D.) Round-robin
E.) Output-sap-filter
If you are in IOS user mode, which command do you use to enter the privileged mode? A. Set B. Enable C. Configure D. Privileges
Which of the following are Presentation Layer standards? A.) JPEG and PICT B.) MPEG and MIDI C.) ASCII and EBCDIC D.) NFS and SQL
What are the different types of the password used in securing a cisco router?
What command displays a summary list of OSPF interfaces that includes a column for the cost of each interface?
Mention what BOOTP is?
What field tells the Internet layer how to handle an IP packet? A. Type of Service B. Identification C. Flags D. Frag Offset
comparative networking features windows linux
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
Which two statements are true? (Choose two) A. Ethernet 802.3 utilizes a half duplex method for data transfer B. In a 100 MBS point to point connection a full duplex connection can provide 400 Mbs of data transfer C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single pod of a switch D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception
What is the Function of Layer3 Switch?
Explain what is route poisoning?
What is the administrative distance for IGRP? A.) 90 B.) 120 C.) 110 D.) 100