Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Which 3 statements describe default encapsulation and LMI type

configuration?

A.) There are only 4 encapsulations and 3 LMI type options

B.) The LMI type config term options

C.) In release 11.2 the LMI type is autosensed

D.) The default LMI is Cisco

E.) IETF encapsulation must be configured unless the
connecting routers

are both

Cisco



Which 3 statements describe default encapsulation and LMI type configuration? A.) There are on..

Answer / guest

Answer: B C E

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

In how many ways can data be transferred in ccna?

0 Answers  


hi i have some difficulty plz reply as s0on as possible. 1 what is csma/cd(i know u are familer with that protocol) 2 what is the need for it and and 3 rd one in which i need help how to enable csma/cd at router or switches shain make it answer as sson as possibele and call me afetr reply thanks jitendera kuamr sinha

1 Answers  


Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM

1 Answers  


Which device works at the Network Layer of the OSI model? Router Switch Bridge Hub

5 Answers   CET, IBM,


Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share

2 Answers  


Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john

1 Answers  


In regards to TCP/IP, which class of address allows for the fewest valid Internet hosts? A.) D B.) E C.) Classes are not used in TCP/IP. D.) B E.) C F.) A

1 Answers  


What are three benefits of Integrated Services Digital Network (ISDN) (Choose three) A. PVCs are faster and more reliable B. No specialized equipment is required C. Data transfer is faster than typical modems D. Call setup is faster than with standard telephone service E. It carries many types of data tramp such as voice video and data

1 Answers  


What are the different memories used in a CISCO router?

0 Answers  


How do you depict an IP address?

0 Answers  


Which of the following would not be displayed by the command ?sho cdp neighbor detail?? A.) The incoming/outgoing interface. B.) The hardware platform. C.) One address per protocol. D.) Amount of Flash Memory Available E.) The routers hostname. F.) The subnet mask, if IP is configured.

1 Answers  


Which type of switching reads in the entire frame before forwarding it? A.) Pause-and -forward B.) Store-and-Forward C.) Inverse ARP D.) Fast Forward E.) Cut-Through F.) Routing

2 Answers  


Categories