Why we used Virtual MAC in GLBP


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Identify the command mode necessary to enter the standard ping command? A.) Router(config)# B.) Router> C.) Router(std-ping)# D.) Router(config-if)#

2 Answers  


Identify the protocol to test connectivity without configuring any layer 3 protocols? A.) TCP B.) Ping C.) IP D.) CDP E.) Telnet

1 Answers  


Which of the following are characteristics of UDP? A.) UDP is connection oriented. B.) UDP is used with TFTP. C.) UDP is unreliable. D.) UDP is connectionless. E.) UDP is at the transport layer. F.) UDP uses no acknowledgements.

2 Answers  


Identify 3 IP routing protocols? A.) RIP B.) AURP C.) OSPF D.) IGRP E.) ARP F.) ICMP

3 Answers  


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  






Identify the 2 commands the saves the running-config to NVRAM? A.) write memory B.) copy running-config startup-config C.) write network D.) write backup

2 Answers  


The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments

1 Answers  


What is the name of algorithm of eigrp protocol?

0 Answers  


What is a back off on an 802.3 networks? A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. It is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged

1 Answers  


why we give clock rate to DCE and not to DTE what is the difference in the two.

3 Answers  


What is the meaning of PASSIVE interface in RIP, IGRP, EIGRP & OSPF?? Can any one explain..!!!

6 Answers  


Identify 3 characteristics regarding IP access-lists? A.) Can be configured as a standard access-list B.) Can be run from another router running IP C.) Can be configured as a named access-list D.) Are the same as IPX access-lists E.) Can be configured as an extended access-list

1 Answers  


Categories