Novell NetWare has an Ethernet frame type called
Ethernet_II. What

is the

matching Cisco command line keyword for this encapsulation
method?

A.) dix

B.) sap

C.) arpa

D.) gns

E.) snap

F.) novell-ether



Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco comm..

Answer / guest

Answer: C

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is the difference between cross cable and straight cable?

0 Answers  


What command will not display the status of to1? A.) show int to1 B.) show to1 C.) show interface to1 D.) show interface

1 Answers  


What is the administrative distance for RIP? A.) 100 B.) 90 C.) 120 D.) 110

8 Answers  


What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message

1 Answers  


What is the regional telco office called, where the customers local loop terminates? A.) Demarc B.) DTE C.) DCE D.) CO E.) CPE

1 Answers  






HI I am Rajveersinh. I am Leaving in Ahmedabad-gujarat. I am Hardware & Networking Stundent In JETKING. my Intersted in CICKO Side. Please send ME totel detail in CICKO surtifiction my E-mail ID IS as_raj@ymail.com

6 Answers   HCL,


Can you explain encapsulating, carrier and passenger protocol?

0 Answers   CCIE,


Why would you use static routing instead of dynamic routing? A.) When you want automatic updates of the routing tables B.) All the time C.) When you have very few routes and want to conserve bandwidth D.) When you have a gateway of last resort

1 Answers  


How many networks route update does a router recieves in RIP at once ?

3 Answers   ComNet,


What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.

1 Answers  


Which two statements about a reliable connection oriented data transfer are true? (Choose two) A. recipients acknolwedge receipt of data B. when tankers are filled to capacity, datagrams are discarded and not retransmitted C. windows are used to control the amount in outstanding unacknowledged data segments D. if the sender a timer expires before receipt of an acknowledgement the sender drops the connection E. The receiving device waits for acknowledgements from the sending device before accepting more data segments

1 Answers  


Identify 3 features of IGRP? A.) Composite metric B.) New horizon C.) Flash (triggered) updates D.) 60-second periodic updates E.) Poison reverse

1 Answers  


Categories