Identify 3 characteristics of switches?
A.) Increase available bandwidth
B.) Decrease broadcast traffic
C.) Support full duplex in a multipoint topology
D.) Make fowarding decision using MAC address
E.) Create collision domains
On which mode we give debug command?
Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport
Which can be logged by IPX extended access lists? A.) source address B.) protocol C.) source socket D.) access list number E.) destination socket F.) destination address
When setting up a frame-relay network between a Cisco router and a non-Cisco router, what encapsulation type should you use? A.) SAP B.) CISCO C.) IANA D.) Apollo E.) IETF F.) Q933A
Value in which type of access list?
Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do? A. It tells the router to check the corresponding bit value. B. It tells the router to ignore the corresponding bit value. C. It tells the router to check its alternate routing list. D. It tells the router to use its primary routing list.
Which ipsec rule is used for the olympia branch and what does it define? (Choose two)
whats the routing protocol supporting in both juniper , cisco routers.
How does cut-through LAN switching work?
What is the Broadcast MAC Address?
What is a protocol
hi shain i have got some virus who make the .exe file that is duplicate of original file on my server 2007 windows can u suggest me any anti virus help help please help