Novell NetWare has an Ethernet frame type called
Ethernet_II. What
is the
matching Cisco command line keyword for this encapsulation
method?
A.) dix
B.) sap
C.) arpa
D.) gns
E.) snap
F.) novell-ether
Define topology?
What is the routing algorithm used by RIP and IGRP? A.) OSPF B.) Link-state C.) Dynamic D.) Distance Vector
Which command displays all the commands in the history buffer? A. CTRL H B. show buffer C. show history D. show history buffer
Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
Tell me when we use standard access-list?
How we can see mac address from dos prompt?
As the system administrator, you enter the following commands at the command prompt: ipx routing access-list 800 permit 2b 4d int e0 ipx network 4d ipx access-group 800 out int e1 ipx network 2b int e2 ipx network 3c What did these command accomplish? A. Traffic from network 4c destined for network 4d will be forwarded out Ethernet0. B. Traffic from network 3c destined for network 4d will be forwarded out Ethernet0. C. Traffic from network 2b destined for network 4d will be forwarded out Ethernet0. D. Traffic from network 4d destined for network 2d will be forwarded out Ethernet0.
What is difference between Store-and-Forward, cut-through, Fragment-Free Method?
What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.
What are two ways IPX supports multiple logical networks on an individual underrate? (Choose two) A. network number B. routing protocol C. encapsulation type D. autonomous system number
which points are eliminated by the DBSCAN algorithm?