Which of the following are examples of the Session Layer?
A.) TCP
B.) RPC
C.) SQL
D.) NFS
E.) Token Ring
Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) Token Ring E.) FDDI F.) TCP
An autonomous system can only exist if all routers in that system meet which criteria? A. interconnected B. run the same routing protocol C. assigned same autonomous system number D. run IGRP only E. run RIP only
which is following route will be used to froword data in a situation where a routing table tables contains static ,RIP,IGRP routes destined to the same network with each set to its default administrative distance
Novell NetWare has an Ethernet frame type called Ethernet_II. What is the matching Cisco command line keyword for this encapsulation method? A.) dix B.) sap C.) arpa D.) gns E.) snap F.) novell-ether
Identify the command to display the configured IP routing protocols? A.) show protocols B.) show protocols all C.) show routing-protocols D.) show ip protocols
What are the two components of an IPX address? A. network number IP address B. MAC address node number C. network number MAC address D. network number arched number
Which of the following can reply to a Novell Get Nearest Server (GNS) request? A.) Local Novell server B.) Remote Novell Printer C.) Cisco router D.) Novell client
Identify the statement which connects access-list 101 inbound to interface e0? A.) Router(config-if)# ip access-group 101 in B.) Router(config-if)# ip access-group 101 C.) Router(config)# ip access-group 101 e0 in D.) Router(config)# ip access-group 101 e0 in
What is the Difference Between Windows 2003 And Windows 2008 Server?
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
What are characteristics of UDP A. It is reliable and acknowledged B. It is unreliable and acknowledged C. It is reliable and unacknowledged D. It is unreliable and unacknowledged