Which two protocol tools use ICMP? (Choose two)
A. ping
B. telnet
C. configure
D. traceroute
E. show commands
F. standard access lists
Answers were Sorted based on User's Feedback
Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy
How many fillers we can put in one ip of ipv6?
Identify 3 methods used to prevent routing loops? A.) Split horizon B.) Holddown timers C.) Poison reverse D.) SPF algorithm E.) LSP's
What is the default LMI type for Cisco Routers that are using Frame-Relay? A.) Annex D B.) Q933A C.) Cisco D.) IETF E.) ARPA F.) Anex A
What is the default routing metric used by IGRP? A.) MTU, delay, bandwidth, reliability, and loading B.) Count to infinity C.) Bandwidth and delay D.) Hop count
What is poe (power over ethernet)?
Identify the administrative distance and appropriate routing protocol? A.) RIP = 255, IGRP = 100 B.) RIP = 100, IGRP = 120 C.) RIP = 1, IGRP = 0 D.) RIP = 120, IGRP = 100
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.
Identify 3 characteristics of ISDN? A.) Transports voice and data B.) Transports voice only C.) Support both BRI and PRI D.) Runs over existing phone lines E.) Same as X.25
Explain how an spf algorithm works?
The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments