IPX traffic using different encapsulation types can go over
the same data link
A. True
B. False
What is the default encapsulation of Netware 3.12? A.) Ethernet_II B.) 802.5 C.) 802.2 D.) 802.3
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.
Why would you use static routing instead of dynamic routing? A.) When you want automatic updates of the routing tables B.) All the time C.) When you have very few routes and want to conserve bandwidth D.) When you have a gateway of last resort
Identify 2 HDLC characteristics? A.) Default serial encapsulation B.) Open standard C.) Supports Stacker compression D.) Supports point-to-point and multipoint
b Which protocol for PPP LCP (Link Control Protocol) performs a challenge handshake? A. CHAP B. PAP C. UDP D. IPX
You are conferring a Frame Relay router with subinterfaces on interface Serial 0 Which subinterfaces numbers could you use for this configuration? A. 1 and 2 B. 0 2 and 0 3 C. 1 0 and 1 1 D. 0 1 a and 0 1
CPE is an acronym for which of the following? A.) Customer Premise Equipment B.) Central Processing Engineering C.) Customer Process Equipment D.) Central Processing Equipment
what is the difference between 1 router and switch 2 router and hub 3 hub and switch 4 bridge and switch
Dear Mr.Shahin thank you very much for your advise i realy thanks full to you. Best of luck
What information can you get from CDP info: (choose all that apply) A.) Hardware platform B.) One address per protocol C.) Software platform D.) Hostname E.) The same info as show version F.) Incoming/outgoing port
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
Why we used Virtual MAC in GLBP