Which technology is used by Catalyst switches to resolve
topology loops and ensure data flows properly through a
single network path?
A. virtual LANS (VLANS)
B. frame filtering
C. cut-through switching
D. spanning-tree protocol
Answers were Sorted based on User's Feedback
10.1.1.0 n/w advertised as /16 from EIGRP & /24 from OSPF which will come in routing table & why
Explain the difference between igp and eigrp?
Which network mask should you place on a Class C network to accommodate a user requirement of ten subnetworks? A. 255.255.255.192 B. 255.255.255.224 C. 255.255.255.240 D. 255.255.255.248
The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC
Which statement is true? A. While bridges are used to segment networks, they will not isolate broadcast or multicast packets. B. A bridge looks at every packet within its network segment and works like a hub re-broadcasting the packet if the destination is within its network segment. C. A bridge maintains a table of the IP addresses of the hosts within its network segment and forwards the packet directly to the destination based upon the IP address. D. A bridge resets the hop count by keeping all packets within the network segment. Only packets addressed to a specific destination host outside the network segment are allowed to pass through the bridge.
How many types of memories are used in cisco router?
Explain the term 'multicast'.
You are given the following address: 128.16.32.13/30. Determine the subnet mask, address class, subnet address, and broadcast address. A. 255.255.255.252, B,128.16.32.12, 128.16.32.15 B. 255.255.255.252, C,128.16.32.12, 128.16.32.15 C. 255.255.255.252, B,128.16.32.15, 128.16.32.12 D. 255.255.255.248, B,128.16.32.12, 128.16.32.15
Which of the following describe full-duplex transmission? A.) Uses a single wire B.) Data transmission in only both directions, but only one way at a time C.) Uses a point-to-point connection from the transmitter of the transmitting station to the receiver of the receiving station D.) Data transmission in only one direction
Which reserve port number talent use?
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
Which of the following is a layer 2 device? A.) Switch B.) Bridge C.) Repeater D.) Hub