Put the following steps of encapsulation into the correct order:
1) The data is broken into segments to be organized
2) Frames are converted to 1s and 0s to be put on the wire
3) Packets are converted into frames
4) Information that users enter is converted into data
5) The segments are changed to packets to be routed
A.) 4, 1, 3, 2, 5
B.) 4, 5, 1, 3, 2
C.) 2, 3, 1, 4, 5
D.) 4, 1, 5, 3, 2
Which 3 statements describe default encapsulation and LMI type configuration? A.) There are only four encapsulations and 3 LMI type options B.) The LMI type config term options C.) In release 11.3 the LMI type is autosensed D.) The default LMI is Cisco E.) IETF encap must be configured unless the connecting routers are both cisco
What does a Standard IP Access-list use as test criteria? A.) IP source address B.) IP source and destination address, protocol numbers and port numbers C.) IPX source and destination address D.) Source MAC address
Identify the command mode necessary to enter the extended ping command? A.) Router# B.) Router> C.) Router(config)# D.) Router(ext-ping)#
Company XYZ has an employee that works out of the home. The employee runs big client server applications and must quickly transfer large files. The company wants the best cost/benefit on this connection. What would be the most practical solution? A. an ISDN Basic Rate Interface (BRI) connection to the user at home B. a dedicated T1 connection to the user at home C. a dedicated Frame Relay connection to the user at home D. a standard 28.8 analog dialup connection to the user at home
Which two of the following protocols are used at the Transport layer? A.) ARP B.) UDP C.) ICMP D.) RARP E.) TCP F.) BootP
What is the difference between private ip and public ip?
what is farme realy.and on which layer it work
Why we choose the router rather then L-3 Switch
8 Answers Network Solutions, Wipro,
The ICMP (referred to in PFC 1700) is implemented by all TCP/IP hosts A. true B. false
what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how to block some site on that which form user not able to access site and basic firwall config and why are we using firwall please jittendra explain it.can u send me doc of firwall in my gmail id - dsoni89@gmail.com
Novell NetWare has an Ethernet frame type called Ethernet_802.2. What is the matching Cisco command line keyword for this encapsulation method? A.) gns B.) arpa C.) snap D.) sap E.) novell-ether F.) dix
255.255.255.128/what is the n/w id ,broadcast id and the number of valid host(according to disco rules)