What is a characteristic of Store and Forward switches?
A.) They forward the frame before it is completely read.
B.) They work at wire speed.
C.) They are the same a Cut-Through switching.
D.) They read the entire frame and check CRC before forwarding.
E.) They decrease latency.
When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes
Given the command 'cl?', what will it display? A.) Syntax of the 'clock' command B.) Syntax of the 'clear' command C.) All commands that begin with 'cl' D.) All commands that begin with 'c'
which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance
Classful routing protocols do not include subnet masks in their routing updates. Which of the following routing protocols are considered classful? A.) EIGRP B.) OSPF C.) TCP D.) IGRP E.) RIP F.) IP
What are the Timer of RIP, IGRP, EIGRP and OSPF Routing Protocol?
Explain how an spf algorithm works?
You would like to have a notation that when a user issues the command 'show interface serial 0', a line is displayed indicating that, 'This is the connection to Company A.' What interface command would accomplish this? A.) banner motd #This is the connection to Company A.# B.) interface This is the connection to Company A. C.) This cannot be done for an individual interface. D.) description This is the connection to Company A. E.) banner This is the connection to Company A. F.) display This is the connection to Company A.
Which statement is true regarding Administrative distance? A.) It is a metric B.) Number of hops between two routers C.) Trustworthiness of the routing information D.) RIP Administrative distance is 100
Which command should you use to create an IP standard access list? A. access-list standard 172.16.4.13 B. access-list 1 deny 172.16.4.13 0.0.0.0 C. access-list 100 deny 172.16.4.13 0.0.0.0 D. access-list 198 deny 172.16.4.13 255.255.255.255
How do areas benefit a link state inter network?
Which company mange api's?
What is the beaconing?