Identify the order of the 5 step encapsulation?
1) Create the segment
2) Convert the frame to bits
3) Create the packet
4) Create the frame
5) User creates the data
A.) 1,2,4,2,5
B.) 2,1,3,4,5
C.) 5,1,3,4,2
D.) 5,3,4,1,2
Which of the following are logged when IP access list logging is enabled? A.) source address B.) protocol C.) source port D.) destination address E.) access list number F.) destination port
What is the different between console port and auxiliary port?
You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? A. 10101100 00010000 B. 00000010 10100000 C. 10101100 00000000 D. 11100000 11110000
What are the advantages of using switches?
What is ospf? Describe it.
What is the difference between static and dynamic ip addressing?
What type of Ethernet operation allows only one entity to transmit at a time? For example, if someone else is transmitting, they must wait. A.) Full-Duplex B.) Dual-Duplex C.) Half-Duplex D.) Latex E.) Quarter-Duplex F.) Suplex
Which OSI Reference Layer controls application to application communication? A.) Datalink B.) Network C.) Transport D.) Session E.) Physical
What is default packet size of ipv6?
any body can send me CCNA voice simulator practice exam software.
What are the ranges of private ips?
Novell IPX network addresses have two conferrable parts. The network administrator specifies the IPX network number. How is the node number determined? A. It is the serial number of the given device B. It is assigned as a lease by Novell DHCP C. It is also set by the network administrator D. It is usually the MAC address of one Interface E. It is downloaded by Netware Core Protocol (NCP)