UDP works at which layer of the DOD model?
A.) Internet
B.) Host-to-Host
C.) Transport
D.) Data Link
Answers were Sorted based on User's Feedback
Identify the 3 guidelines for routers in the same autonomous system? A.) Must be configured for RIP B.) Interconnected C.) Assigned the same autonomous system number D.) Configured for the same routing protocol E.) Must be same model of router
What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic D.) Distance Vector
Why Authentication Header (AH) is not compatible with the network that using NAT?????? Jitu, looking for u specially...!!!! U knw why i m looking for u..!!!
Can you explain how L2F data tunneling process works?
Which router command allows you to determine if an IP access list is enabled on a particular interface? A. Router# show ip interface B. Router> show access-list C. Router# show ip access-list D. Router> show interface ip access-list E. Route 1 P.O. box 198
What is the name of best path in eigrp protocol?
When does network congestion occur?
what is uplink port why are we use this port,this port having extra feature or only use to redundant link or other please explain it ,,,,,,,,,,,,,,,, bcz i am very confuse ..... Thanks
Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router
Which statement about the Committed Information Rate (CIP) is true? A. It is the rate in bits per second at which the Frame Relay switch agrees to transfer data B. It is the clock speed (pod speed) of the connection (local loop) to the Frame Relay cloud C. It is the maximum number of bits that switch can transferduring any Committed Rate Measurement Interval D. It is a signaling standard between the 3PE device and FP switch. It is responsible for managing the connection and maintaining status between the devices.
What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6
Which three are typical operational phases in a basic connection oriented neloyord service? (Choose three) A. call setup B. data transfer C. load balancing D. call termination E. call priortization F. data segmentation G. data link identification