Why we used Virtual MAC in GLBP
No Answer is Posted For this Question
Be the First to Post Answer
Identify 3 characteristics regarding CDP? A.) On by default B.) Shows only directly connected neighbors C.) Requires IP or IPX D.) 60 second update interval by default E.) 30 second updates interval by default
Why Authentication Header (AH) is not compatible with the network that using NAT?????? Jitu, looking for u specially...!!!! U knw why i m looking for u..!!!
Can anyone explain in details port fast, uplink fast & backbone fast features introduced by CISCO (The GOD FATHER of NETWORKING.... Hehehehehe).
How we can find ASBR Router, we have no authentication to enter router?
What is a back off on an 802.3 networks? A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. It is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged
In which two modes can the ICMP ping command be used? (Choose two) A. user B. privileged C. global configuration D. interface configuration
What is wide-mouth frog?
Explain why is udp lease favored when compared to tcp?
To monitor ipx traffic on a network, what command would you use? A. debug ipx transaction B. show ipx traffic C. show ipx events D. display ipx traffic
Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share
Windowing is a type of? A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control
The Internet Protocol (IP) occurs at what layer of the seven layer model? A.) Physical B.) Presentation C.) Network D.) Datalink E.) Session F.) Transport