What do you use the Aux port for?
A.) Console
B.) Terminal editing
C.) Modem
D.) Backup logging
Which peer authentication method and which ipsec mode is used to connect to the branch locations?
Which two statements about integrated services digital network (ISDN) are true? A. ISDN provides data only capability B. ISDN provides an integrated voice/data capability C. The ISDN standards define the hardware and call setup schemes for end the end digital connectivity D. Users receive more bandwidth on WANS with a leased lin of 56 Cops than with multiple B channels
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
What is the name of distance vector algorithm?
Identify the 2 commands to copy a configuration from a TFTP server to RAM? A.) configure network B.) configure overwrite C.) copy backup-config running-config D.) copy tftp running-config
What is an autonomous system?
what is the difference between eigrp and ospf
In how many ways you can access router?
What is the subnet? Why is it used?
Which 2 protocols are in wan technology?
How many total hosts are possible with a Class C address and a subnet mask of 255.255.255.252? A. 4 B. 30 C. 60 D. 62 E. 112 F. 124
What is NOT a characteristic of a network segment on a switch? A. The segment has its own collision domain B. The segment can translate from one media to a different media C. All devices in the segment are part of the same broadcast domain D. One device per segment can concurrently send frames to the switch.