Which line from a show spantree 1 command output indicates
that virtual LAN 1 (VLAN1) is functioning properly?
A. Root pod is FastEthernet 0/26
B. Port Ethernet 0/1 of VLAN1 is Forwarding
C. Designated port is Ethernet 0/1, path cost 10
D. Designated root has priority 0 address 00D0 588F B600
E. VLAN1 is executing the IEEE compatible Spanning Tree Protocol
Assume that you are editing a line of text on a Cisco router. What key-stroke combination would take you to the beginning of the line? A.) CTRL-B B.) CTRL-Z C.) CTRL- D.) CTRL-A E.) CTRL- F.) CTRL-
What is the protocol and what is the second part of the following network address? 172.16.0.254 mask - 255.255.0.0 A. IPX MAC address B. IP Class C directed broadcast C. Private IP address node number D. Public IP directed broadcast E. Private IP directed broadcast
What will be the prefix length of 224 in vlsm?
Suppose we have some switch in network and we are running RSTP how much convergence time will be there if one link down
Which protocol gets a hardware address from a known IP address? A.) RARP B.) TCP C.) IP D.) BootP E.) ARP F.) ICMP
What is the network brouter?
What is EIGRP?
In static route, what is the difference between next hop ip address and local interface address, except the Administrative Distance.
How do areas benefit a link state inter network?
The following selections show the command prompt and the configuration of the IP network mask. Which two are correct? A. Router#term IP netmask-format { bitcount | decimal | hexadecimal } B. Router(config-if)#IP netmask-format { bitcount | decimal | hexadecimal } C. Router(config-if)#netmask-format { bitcount | decimal | hexadecimal } D. Router#ip netmask-format { bitcount | decimal | hexadecimal }
Which OSI Reference Layer controls application to application communication? A.) Datalink B.) Network C.) Transport D.) Session E.) Physical
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity