Which layer of the 7 layer model is responsible for
representing the
application information between 2 different OS's? For
example, converting
ASCII to EBCIDIC.
A.) Transport
B.) Application
C.) Physical
D.) Session
E.) Presentation
F.) Network
Answers were Sorted based on User's Feedback
What is the difference between csma/cd?
In which three situations is a hold down timer reset? (Choose three) A. when the hold down timer expires B. when infinity is finally defined as some maximum number C. when the router exchanges update summaries at area borders D. when the router detects faulty LSPs propagating through the internetwork E. when another update is received indicating a new route with a better metric F. when another update is received indicaing the original route to the network has been restored G. when the router receives a processing task proportional to the number of links in the internetwork
Identify 3 methods not used to prevent routing loops? A.) Holddown timers B.) Sequence numbers C.) Triggered updates D.) Split horizon E.) Area hierarchies F.) Order of router startup
Identify the following components of the IPX address 2e.0000.0065.ed43 A.) Not a valid IPX address B.) Network = 2e, Subnet = 0000, Node = 0065.ed43 C.) Network = 2e.0000, Node = 0065.ed43 D.) Network = 2e, Node = 0000.0065.ed43
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
Which two of the following are valid ways to have multiple encapsulation types on a single interface? A.) This is not possible B.) subinterfaces C.) additional physical interfaces D.) secondary addresses
What is the network brouter?
what is ACLs? what is the reasons to create ACLs?
In transport layer, for connection oriented communication Three way handshake process is there to establish a connection. So question is that, when a host send an ACK messages to another host with host intend to establish a connection, the source host send it as Broadcast or unicast message? Cud anyone explain this. Thanks in advance.
Can anyone explain the STP Security features. Just like BPDU guard, Root Guard. Hi JITENDERA, i m specially looking for u?????
FastEthernet compares to 10baseT Ethernet in which of the following ways
In which two modes can the ICMP ping command be used? (Choose two) A. user B. privileged C. global configuration D. interface configuration