You are conferring a Frame Relay router with subinterfaces
on interface Serial 0 Which subinterfaces numbers could you
use for this configuration?
A. 1 and 2
B. 0 2 and 0 3
C. 1 0 and 1 1
D. 0 1 a and 0 1
whats the routing protocol supporting in both juniper , cisco routers.
Which two protocol tools use ICMP? (Choose two) A. ping B. telnet C. configure D. traceroute E. show commands F. standard access lists
What are the things that can be accessed in a CISCO router’s identifying information?
What two types of PPP data compression are available using Cisco IOS? A.) Predictor B.) DoubleSpace C.) Stacker D.) PAP E.) ZIP F.) CHAP
hi all.. can any one explain the complete topology of stp and rstp how it works . root swtch connects to a root port and then root port conenct to other switchs designated port. i was going thru his site http://www.cisco.com/en/US/tech/tk389/tk621/technologies_whi te_paper09186a0080094cfa.shtml in which DR also exist on root switch only which makes my understanding grim.I had a diff notion of stp all together. please post asap. and if possible refer a url so thst i can read it my self .. thanks
Which peer authentication method and which ipsec mode is used to connect to the branch locations?
Identify 3 UDP characteristics? A.) Reliable communication protocol B.) Applications that use UDP must incorporate reliability C.) Connnection-less oriented D.) Incorporates no handshaking
Differentiate between broadcast domain and collision domain
Identify the protocol to test connectivity without configuring any layer 3 protocols? A.) TCP B.) Ping C.) IP D.) CDP E.) Telnet
What is the difference between lan, man, and wan?
What is the difference between communication and transmission?
Each department has its own file server and the company has an enterprise server that is shared by all departments. What does a network administrator use to provide a secure separation between the management and sales departments? A. a bridge between management and sales B. routers to provide the most secure segmentation C. a hub to provide ease of management and a satisfactory alternative for network security D. an Ethernet switch to maintain secure separationthrough programming the access lists for each port of the switch