Given the configuration example<HR>
<B>interface ethernet0
ipx network 4a
ipx access group 800 out
interface ethernet1
ipx network 3d
interface ethernet2
ipx network 5c
access list 800 permit 3d 4a</B><HR>
Which two actions result from implementing this
configuration? (Choose two)
A. IPX network 5c will not receive any traffic
B. Traffic from network 3d for network 4a will be forwarded
out e0
C. Traffic from network 4a for network 3d will be forwarded
out e0
D. Traffic from network 3d destined for network 4a will be
forwarded out e2
E. The access list is applied to an outgoing interface and
filters outbound traffic
What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos
Routers that have Flash memory typically have a ore loaded copy of place IOS software. Which command should you use to make a backup copy of the software image onto a given network server? A. copy flash tftp B. save copy to tftp C. write backup tftp D. write, backup -server-name- E. copy backup to -server-name-
2. What are the valid ways to segment a LAN? (Choose all that apply) A. Repeater B. Bridge C. Switch D. Router
When ip confliction accord in subnet which ip assigned automatically and what it called?
Which protocol comes under hybrid dynamic type?
What is the default size of a standard ping on a Cisco router? * A: 100 bytes * B: 32 bytes * C: 10 bytes * D: 16 bytes
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.
Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link
What is the maximum value of administrative you can use?
What is the mac address?
How is rip different from igrp?