Which two statements about a reliable connection oriented
data transfer are true? (Choose two)
A. recipients acknolwedge receipt of data
B. when tankers are filled to capacity, datagrams are
discarded and not retransmitted
C. windows are used to control the amount in outstanding
unacknowledged data segments
D. if the sender a timer expires before receipt of an
acknowledgement the sender drops the connection
E. The receiving device waits for acknowledgements from the
sending device before accepting more data segments
When would you use ISDN? A.) To connect LANs using POTS B.) To support applications requiring voice, data, and video C.) When you need a consistent and very high rate of data speed D.) To connect to IBM mainframes
Which 3 statements describe default encapsulation and LMI type configuration? A.) There are only 4 encapsulations and 3 LMI type options B.) The LMI type config term options C.) In release 11.2 the LMI type is autosensed D.) The default LMI is Cisco E.) IETF encapsulation must be configured unless the connecting routers are both Cisco
What are the Timer of RIP, IGRP, EIGRP and OSPF Routing Protocol?
what is the difference between dynamic NAT and NAT overload ? and how it works ?
What is true when creating static route? A.) The mask parameter is optional B.) The administrative distance is required C.) The gateway parameter is required D.) The administrative distance is optional
Can you explain different components in PKI?
How do you disable CDP on the entire Router? A.) Router#no cdp run B.) Rotuer(config-if)# no cdp enable C.) Router(config)# no cdp enable D.) Router(config)# no cdp run
what is the binary value of loop back address
What metric does rip use? How is the metric used to indicate an unreachable network?
When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised
What must be true for two Routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D)Configured for PPP
Identify the command to run 'setup'? A.) Router(config)#setup B.) Router?setup C.) Router#setup D.) Router>setup