Which two commands allow you to verify address configuration
in your unternetword? (Choose two)
A. ping
B. trace
C. verify
D. test ip
E. Echo ip
F. config ip
Answers were Sorted based on User's Feedback
Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link
Hi Jitendera, I continuously read your answers which is more knowlegable than books... Q.I am facing some problems in subnetting.can you plzz explain the subnetting process.. will be remain thankful
Which two steps are required to confound and apply standard access lists on an interface? (Choose two) A. define an access list number and its parameters B. enable an interface to become part of the access list group C. define the number of access lists to be supported on an interface D. copy the access list definition to each interface that will support it
How do you configure a Cisco router to route IPX?
What is difference between standard and extended access-list
17 Answers College School Exams Tests, HCL, Wipro,
If you are in IOS user mode, which command do you use to enter the privileged mode? A. Set B. Enable C. Configure D. Privileges
Which command sets IGRP as the routing protocol for autonomous system 100? A. Router(config)#igrp 100 B. Router(config)#network 100 C. Router(config)#router igrp 100 D. Router(config)#enable igrp 100
How can you assign a vlan to a switch port?
Which layer of the 7 layer model provides services to the Application layer over the Session layer connection? A.) Transport B.) Application C.) Session D.) Network E.) Datalink F.) Presentation
Identify the command to display the IP routing table? A.) show route B.) show ip route C.) show ip table route D.) show ipx route
What is cam?
What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.