Identify IPX SAP and it's purpose?
A.) Sonet Access Pipe - interface to Sonet ring
B.) Service Advertising Protocol - advertise services
C.) Server Appletalk Protocol - appletalk directory services
D.) Service Access Point - identify upper layer protocols
Answers were Sorted based on User's Feedback
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
What is the difference between simple authentication and md5?
What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable
Which of the following encapsulation types can be used on leased-line connections? (Choose two) ❍ A. HDLC ❍ B. Frame Relay ❍ C. ISDN ❍ D. PPP
What is NOT a characteristic of a network segment on a switch? A. The segment has its own collision domain B. The segment can translate from one media to a different media C. All devices in the segment are part of the same broadcast domain D. One device per segment can concurrently send frames to the switch.
How many collision domains are in switch?
Which statement about switched and routed data flows is correct? A. Switches create a single collision domain and a single broadcast domain. Routers provide separate collision domains B. Switches create separate collision domains but a single broadcast domain. Routers provide a separate broadcast domain C. Switches create a single collision domain and separate broadcast domains. Routers provide a separate broadcast domain as well D. Switches create separate collision domains and separate broadcast domains. Routers provide separate collision domains
Brielfly explain the conversion steps in data encapsulation
what is the difference between a ‘half-duplex’ and a ‘full-duplex’ system?
Tell me when we use standard access-list?
What are the two most common transport layer protocols? UDP TCP IPX ARP
You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet