how we update the IOS version with the help of TFTP?
No Answer is Posted For this Question
Be the First to Post Answer
What is the usage of service password encryption?
What is the Broadcast IP Address?
8. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges in your network C. When you install routers in your network D. When you use Switches configured with multiple VLANS
CO is an acronym for which of the following? A.) Central Office B.) Capital Office C.) Central Operator D.) Company Office
Which service takes information from multiple sources and allocates bandwidth on a single media? A. Time-division Multiplexing (TDM) B. Signaling System 7 (SS7) C. X.25 D. Frame relay
What is the difference between ‘bit rate’ and ‘baud rate’?
as i m cccna holder ... then why i m going for bpo's ?
in router we use config# ip host router2 ipaddress we use it for ping the neighbor router using name provided by us ..........instead of ip address in this max how many ip address can be assigned thanks
Identify the administrative distance and appropriate routing protocol? A.) RIP = 255, IGRP = 100 B.) RIP = 100, IGRP = 120 C.) RIP = 1, IGRP = 0 D.) RIP = 120, IGRP = 100
Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2
what is firwall and how to work right now my company having a cisco firwall ASA 5505.So please how to block some site on that which form user not able to access site and basic firwall config and why are we using firwall please jittendra explain it.can u send me doc of firwall in my gmail id - dsoni89@gmail.com
Which layer is responsible for determining if sufficient resources for the intended communication exists? A.) Application B.) Network C.) Session D.) Presentation E.) Transport