Novell NetWare has an Ethernet frame type called
Ethernet_II. What
is the
matching Cisco command line keyword for this encapsulation
method?
A.) dix
B.) sap
C.) arpa
D.) gns
E.) snap
F.) novell-ether
What does 'P' mean when running a Trace? A.) Good route B.) Protocol unreachable C.) Source Quench D.) Destination unreachable
What is the usage of service password encryption?
Which two encapsulation names are correctly paired with the Cisco IOS encapsulation names? (Choose two) A. Ethernet_II-ARPA B. Ethernet_802.3-SAP C. Ethernet_802.2-LLC D. Ethernet_SNAP-SNAP
What is the passive topology in ccna?
What are 3 ways to provide login access to router? A.) Console B.) TFTP C.) Rlogin D.) Auxiliary Port E.) X Windows F.) Telnet
WHY DO WE USE the command interface Vlan 1 ip adress x.x.x.x sub mask what does it do .. what does it create.. i know when we create it we can remotely telnet inti a router=switch. but what is the diff bwt vlan and intface vlan. ... vlan 1 bieng a native vlan remains there eve if i dont gv switch an ip address .. lease suggest.
What is osi reference model?
what is the subnet for the host ip address 172.16.210.0/22
Which two statements are true? (Choose two) A. Ethernet 802.3 utilizes a half duplex method for data transfer B. In a 100 MBS point to point connection a full duplex connection can provide 400 Mbs of data transfer C. Ethernet switches can use the full duplex mode to connect multiple nodes on a single pod of a switch D. Full duplex Ethernet takes advantage of UTP using one pair for transmission and the other pair for reception
The benefits to segmenting with Bridges are which of the following? A.) Scalability B.) Datagram filtering C.) Manageability D.) Reliability
What is the purpose of data link layer?
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet