Which of the following is an example of the Network Layer?
A.) TCP
B.) IP
C.) SQL
D.) Token Ring
E.) LLC
Answers were Sorted based on User's Feedback
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port
Which port are used by Viruses? TCP or UDP?
Explain the difference between routing and routed protocols?
what is vlan
Which of the following are solutions to the problems encountered with Distance-Vector routing? A.) Defining a Maximum B.) Poison Reverse C.) Triggered Updates D.) Shortest path first algorithm. E.) Split Horizon
When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
What ISDN protocol specifies concepts, terminology, and services? A.) Q B.) S C.) I D.) E
Which Cisco IOS command should you use to display the Novell IPX address assignments on a router? A. show ipx addresses B. show ipx interface C. show me the money D. ipx, network (number) E. display ipx addresses F. show ipx routing details
Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols
what is the diffination of bandwidth.
Which device listed below provides clocking for the line? A.) DCE B.) CPE C.) CO D.) DTE E.) Demarc