what is eigrp and what is the benfit of eigrp over igrp
what is route summryization
if one the router route is not showing the what should be
problem how to resolve these problem
what is fessible suceer.
is the load balncing is one of the property of eigrp
what is the metihod of authantication
what is the diffrnec betwee pap and chap
what is stp
command for enabling stp and rstp
why switching loop occur what is the main factor of ocuring
switch loop
what is the mechnaism for stoping the roting loop
what is best diffrence betwwen ospf v1 nad ospf v2
what is vtp
what is the diffrence between vtp version 1 and veron 2
what is the ip address
what is the diffrence betwwen ip address mac address
what is dhcp and how it work
what is 3 way hand shake
what is the difrence betwwen network id and brodcast id
what is the network id for 111.111.111.10/29
what is the command for enabling vlan on 3650 csco switch



what is eigrp and what is the benfit of eigrp over igrp what is route summryization if one the rou..

Answer / jitendra

what is eigrp and what is the benfit of eigrp over
igrp .Eigrp support vlsm where igrp donot

what is route summryization
this is also called suppenating

if one the router route is not showing the what should be
problem how to resolve these problem
routing is not enabled
command is
Router(config)#routeig enable or enable routing(need to
check)

what is fessible suceer.
it is the fessible node that is shortest node in the eigrp
table

is the load balncing is one of the property of eigrp
yes
what is the metihod of authantication
PAP and chaP AAA

what is the diffrnec betwee pap and chap
PAP passwod is send in the txt formet
chap-password is send as encrypted formet

what is stp
spaning tree protol used for stop switching loop

command for enabling stp and rstp
switc(config)#stp mode rstp

why switching loop occur what is the main factor of ocuring
switch loop
Due to Redudancy

what is the mechnaism for stoping the roting loop
split horzion

what is best diffrence betwwen ospf v1 nad ospf v2
v1 for ipv4
v2 for ipv6

what is vtp
virtual trunking protocol

what is the diffrence between vtp version 1 and veron 3
both are the vtp version and v3 work on transparent mode

what is the ip address.
used for identification of network

what is the diffrence betwwen ip address mac address
mac used for identification of node

what is dhcp and how it work
work on DORA

what is 3 way hand shake
refre tennon bom big theroy

what is the difrence betwwen network id and brodcast id
plz refre the privous post

what is the network id for 111.111.111.10/29
sunating do ur self very easy
what is the command for enabling vlan on 3650 csco switch
sitch(config)#vlan database
#vlan name XYZ

Is This Answer Correct ?    5 Yes 2 No

Post New Answer

More CCNA Interview Questions

What are characteristics of UDP A. It is reliable and acknowledged B. It is unreliable and acknowledged C. It is reliable and unacknowledged D. It is unreliable and unacknowledged

2 Answers  


2. What are the valid ways to segment a LAN? (Choose all that apply) A. Repeater B. Bridge C. Switch D. Router

2 Answers  


What is the command use to add a banner to a cisco router configuration?

0 Answers  


4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN

3 Answers   NCTC,


Which two steps are required to confound and apply standard access lists on an interface? (Choose two) A. define an access list number and its parameters B. enable an interface to become part of the access list group C. define the number of access lists to be supported on an interface D. copy the access list definition to each interface that will support it

2 Answers  






Which layer is responsible for providing mechanisms for multiplexing upper-layer application, session establishment, and tear down of virtual circuits? A.) Session B.) Network C.) Physical D.) Transport E.) Application F.) Presentation

2 Answers  


Write out a config to permit only the below MAC address to pass traffic through a port on your switch. in another way writhe a confrigation which permit only mac address trfaic through a port of your switch

3 Answers  


You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? A. 10101100 00010000 B. 00000010 10100000 C. 10101100 00000000 D. 11100000 11110000

2 Answers  


Which two statements about the store and forward switching method are true? (Choose two) A. Latency remains constant regardless of frame size. B. Latency through the switch varies with frame length. C. The switch receives the complete frame before forwarding it. D. The switch checks the destination address as soon as it receives the header and begins forwarding the fram immediately.

1 Answers   CD,


what is leased line and if any issue occur what will u do thai is trouble shootin occurs let leased line is down

1 Answers   Aptron, Cisco, HCL, Volvo,


Identify the 3 pieces of hardware you would not install to prevent broadcasts? A.) Switch B.) Repeater C.) Bridge D.) Router

3 Answers  


Of the following switching types, which one has the highest latency? A.) Cut-through B.) None C.) Store-and-forward D.) Fragment Free

2 Answers  


Categories