What is the purpose and default value of the CDP timer command?
A.) 90 seconds; interval before an entry expires
B.) 60 seconds; interval between updates
C.) 60 seconds; interval before an entry expires
D.) 90 seconds; interval between updates
Which two physical interfaces support PPP? (Choose two) A. Ethernet B. Token Ring C. Synchronous serial D. Asynchronous serial
What is the difference between full duplex and half duplex?
What are two functions of the ICMP protocol? (Choose two) A. to map IP addresses to Ethernet addresses B. to map common names to network addresses C. to forward SNMP alerts to management consoles D. to generate an echo reply in response to a ping test E. to send a host or pod unreachable message from a router to the source of an undeliverable packet
What is the maximum request timer?
IPX routing updates occur how often? A.) Every 30 seconds B.) Every 60 seconds C.) Only as needed D.) When the remote router asks for an update
What is the maximum hop count for IP RIP? A.) Infinity B.) 16 C.) 15 D.) 1
What is the advantage of vlan?
Where is the point between the customers site and the phone carrier that responsibility changes? A.) CO B.) Demarc C.) DCE D.) DTE E.) CPE
Which two describe frame tagging? A.) Examines particular info about each frame B.) A unique ID placed in the header of each frame as it traverses the switch fabric C.) A user- assigned ID defined to each frame D.) The building of filter tables
Given the configuration example<HR> <B>interface ethernet0 ipx network 4a ipx access group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network 5c access list 800 permit 3d 4a</B><HR> Which two actions result from implementing this configuration? (Choose two) A. IPX network 5c will not receive any traffic B. Traffic from network 3d for network 4a will be forwarded out e0 C. Traffic from network 4a for network 3d will be forwarded out e0 D. Traffic from network 3d destined for network 4a will be forwarded out e2 E. The access list is applied to an outgoing interface and filters outbound traffic
Explain which layer are called upper layer?
What are the steps of conversion for data encapsulation?