You need to come up with a TCP/IP addressing scheme for your
company.
Which two factors must you consider when you define the
subnet mask for
the network?
A.) The location of DHCP servers
B.) The volume of traffic on each subnet
C.) The number of subnets on the network
D.) The location of the default gateway
E.) The number of host IDs on each subnet
Answers were Sorted based on User's Feedback
What is syntax of ipv4?
hi i have some difficulty plz reply as s0on as possible. 1 what is csma/cd(i know u are familer with that protocol) 2 what is the need for it and and 3 rd one in which i need help how to enable csma/cd at router or switches shain make it answer as sson as possibele and call me afetr reply thanks jitendera kuamr sinha
Identify the 3 methods routers learn paths to destinations? A.) Dynamic routing B.) None of the above, configured by default C.) Default routes D.) Administrative distance E.) Static routes
What is the mau?
What is true about frame-relay DLCI? A.) DLCI represents a single physical circuit B.) DLCI is optional in all frame-relay networks C.) DLCI identifies a logical connection between DTE devices D.) DLCI is used to tag the beginning of a frame with VLAN information
What is the subnetmask of / 27 in network based and host based?
Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments
Which of the following is True regarding passwords on a Cisco router? A. All passwords can be encrypted B. All passwords can be entered using the set-up dialogue C. A password can be set before a user can enter the privileged mode D. A password can be set for individual lines E. TACACS or Radius password authentication can be used.
Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward
Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols
What is an advantage of local area network (LAN) segmentation? A. smaller collision domains B. elimination of broadcasts C. decreased cost of implementation D. larger number of users within the same domain
What are the Timer of RIP, IGRP, EIGRP and OSPF Routing Protocol?