Identify the 3 characteristics of IGRP?
A.) Uses hop count as a metric
B.) Supports multiple unequal paths
C.) Administrative distance is 100
D.) Configured with an Automous system number
E.) Link state
What is the meaning of synchronization?
What is difference between tcp/ip and osi model?
What is network?
How many valid host IP addresses are available on the following network/subnetwork? 176.12.44.161/30 A. 2 B. 30 C. 254 D. 16,382 E. 65,534
What is Route Poisoning?
Given the configuration example<HR> <B>interface ethernet0 ipx network 4a ipx access group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network 5c access list 800 permit 3d 4a</B><HR> Which two actions result from implementing this configuration? (Choose two) A. IPX network 5c will not receive any traffic B. Traffic from network 3d for network 4a will be forwarded out e0 C. Traffic from network 4a for network 3d will be forwarded out e0 D. Traffic from network 3d destined for network 4a will be forwarded out e2 E. The access list is applied to an outgoing interface and filters outbound traffic
What is the most common layer 2 device? A. Hub B. Router C. Switch D. Repeater
What command would you use to find out the names of Novell servers on a network? A. show ipx servers B. show ipx hosts C. show ipx sap D. show ipx nodes.
You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID
Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message