what does PPTP use for encryption and authentication?
What is the standard ISDN term for a native ISDN modem? A.) ET B.) LE C.) TE2 D.) TE3 E.) TA
What purpose does aging serve in a link state protocol?
Identify the number range for IPX SAP filters? A.) 900 - 999 B.) 1000 - 1099 C.) 800 -899 D.) 100 - 199
What 2 commands verify end to end communications? A.) Trace B.) debug ip session C.) Ping D.) Route
Explain the difference between collision domain and broadcast domain.
Identify the number range for IPX SAP filters? A.) 900 - 999 B.) 1000 - 1099 C.) 800 -899 D.) 100 - 199
What is the protocol number for UDP? A.) 6 B.) 17 C.) 25 D.) 21
What is the distance limitation for 100BaseT? A. 305.955 ft B. 7283.46 inches C. 184 Meters D. 185 Kilometers
. Which command sequence will allow only traffic from network 185.64.0.0 to enter interface s0? A. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-list 25 out B. access-list 25 permit 185.64.0.0 255.255.0.0 int s0 ; ip access-group 25 out C. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-list 25 in D. access-list 25 permit 185.64.0.0 0.0.255.255 int s0 ; ip access-group 25 in
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
What does the trace response !H mean? * A: Network unreachable * B: Not forwarded due to ACL restriction * C: Protocol unreachable * D: Port could not be reached
Wild card mask always in odd value or even?