Using the TCP/IP protocol suite, a message is sent from host
A to a destination IP address on the same LAN. How does
host A determine the destination of a MAC address?
A. It uses a proxy APP
B. It uses APP requests
C. It uses PARP requests
D. It uses a router lookup table
Identify the command to configure a description on an interface? A.) Router> description Finance department B.) Router(config)# description Finance department C.) Router(config-if)# description Finance department D.) Router# description Finance department
Identify 1 characteristic of RARP? A.) MAC to IP address translation B.) Connectionless delivery of packets C.) Can be used to initiate remote O/S load sequence D.) Generates error and control messages
What is loop back ip in ipv6?
How many collision domains are in switch?
Which of the following is a layer 2 device? A.) Switch B.) Router C.) Repeater D.) Hub
Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version
1 what is private vlam 2 if there is a router which have two fast Ethernet from from fa0/0 192.168.10.0/24 network is connected from fa0/1 192.168.20.0/24 network is connected all bacsic routing is done will they communicate 3 what is difference between snmp v1 v2 and v3 what difference between name and stranded access list
What are the two types of transmission technology available in ccna?
Identify the 3 guidelines for routers in the same autonomous system? A.) Must be configured for RIP B.) Interconnected C.) Assigned the same autonomous system number D.) Configured for the same routing protocol E.) Must be same model of router
Can we write any script for router to instruct that from where it will boots e.g. TFTP,FLASH...if yes what is it and how? 1 of my frnds says its possible...
Which command will give the following output: Tty Typ Tx/Rx A Modem Roty AccO AccI Uses Noise Overruns Int * 0 CTY - - - - - 0 0 0/0 - 1 AUX 9600/9600 - - - - - 0 0 0/0 - * 2 VTY - - - - - 2 0 0/0 - 3 VTY - - - - - 0 0 0/0 - 4 VTY - - - - - 0 0 0/0 - 5 VTY - - - - - 0 0 0/0 - 6 VTY - - - - - 0 0 0/0 -
What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.