IP standard access lists use which of the following as a
basis for
permitting or denying packets?
A.) destination address
B.) port
C.) protocol
D.) source address
What is the usage of service password encryption?
Why OSPF uses 2 Multicast IP
Which type for communication switch do?
IP standard access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) port C.) protocol D.) source address
LAN stands for which of the following? A.) Local Area Network B.) Local Arena Network C.) Local Area News D.) Logical Area Network
A routing table contains static, RIP, and EIGRP routes for the same destination network. Which route would normally be used to forward data?
Which updates called incremental updates?
Which OSI layer incorporates the MAC address and the LLC? A.) Data link B.) Network C.) Physcial D.) Transport
In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?
I want to configure a serial interface on a 7500 with a VIP card. What global config command would give me access to a serial interface on a 7500? A.) int 1/0/0 B.) int s 1/0/0 C.) int s 1/1 D.) int s0.1 E.) int s1
What is the difference between named and extended acl?
Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon