comparative networking features windows linux
Which of the following is a characteristic of a switch, but not of a repeater? A.) Switches forward packets based on the IPX or IP address in the frame B.) Switches forward packets based on the IP address in the frame C.) Switches forward packets based on the MAC address in the frame D.) Switches forward packets based only on the IP address in the packet
Which protocol comes under hybrid dynamic type?
Which three pieces of CDP information about neighbours routers are displayed on your console terminal? (Choose three) A. neighbours router a host name B. the neighbours router a hardware platform C. up to one address for each protocol supported D. up to two addresses for each protocol supported
Identify 2 HDLC characteristics? A.) Default serial encapsulation B.) Open standard C.) Supports Stacker compression D.) Supports point-to-point and multipoint
LAN stands for which of the following? A.) Local Area Network B.) Local Arena Network C.) Local Area News D.) Logical Area Network
Which of the follwing are true of standard half-duplex Ethernet circuitry? A. It is alternate one-way communication B. The receive (RX) is wired directly to the transmit (TX) of the remote station C. The transmit (TX) is wired directly to the receive (RX) of the remote station D. Collisions are not possible E. Both stations can transmit simultaneously
You want a message to be displayed every time someone tries to log on to the router. Which command is required to accomplish this task? A.) motd#(message)# B.) banner motd(message) C.) banner motd#(message)# D.) banner motd*(message) E.) banner login#(message)#
Write out a config to permit only the below MAC address to pass traffic through a port on your switch. in another way writhe a confrigation which permit only mac address trfaic through a port of your switch
How does a web page works though each layers ?
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
What are the different layers of osi model?
Which of the following will show an extended access list 150? A.) sh access-list B.) sh ip int C.) sh ip access-list 150 D.) sh access-list 150 extended