Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the default switching method for the Cisco 5000 series?

A.) Cut-through

B.) Store-and-splice

C.) Latency

D.) Store-and-forward



What is the default switching method for the Cisco 5000 series? A.) Cut-through B.) Store-and-..

Answer / guest

Answer: D

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes

1 Answers  


When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.

1 Answers  


Cisco's implementation of ISDN BRI has multi protocol support, SNMP MIB support, and what other features? A.) Call waiting B.) Compression C.) ADSL D.) 1.544 Mbps E.) Call screening F.) Negative 'G' support

1 Answers  


Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion

2 Answers  


Can you explain encapsulating, carrier and passenger protocol?

0 Answers   CCIE,


What are the three sources of signal degradation on a data link?

0 Answers  


What 2 commands verify end to end communications? A.) Trace B.) debug ip session C.) Ping D.) Route

2 Answers  


What does the Frame Relay switch use to distinguish between each PVC connection? A. data-link connection identifiers (DLCIs) B. BECNs C. FECNs D. the Local Management Interface (LMI)

2 Answers  


Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI

1 Answers  


How broadcast is created in switch

1 Answers  


Which of the following are valid WAN terms? A.) DTE B.) DCE C.) Demarc D.) CPE

1 Answers  


Which of the following protocols are used for logical network addressing? A.) IP B.) TCP C.) ARP D.) ICMP E.) RARP F.) BootP

1 Answers  


Categories