What command displays only OSPF routes?
Answers were Sorted based on User's Feedback
Which two statements about the store and forward switching method are true? (Choose two) A. Latency remains constant regardless of frame size. B. Latency through the switch varies with frame length. C. The switch receives the complete frame before forwarding it. D. The switch checks the destination address as soon as it receives the header and begins forwarding the fram immediately.
Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A. trace B. ping C. telnet D. bootp
In regards to the OSI seven-layer model, at which layer is EBCDIC and ASCII? A.) Presentation B.) Application C.) Transport D.) Session E.) Datalink F.) Network
In Novell's use of RIP, there are two metrics used to make routing decisions. Select the two metrics. A. Ticks. B. Hops C. Loops D. Counts
What is a backoff on an 802.3 networks A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. it is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged.
hi shain/sudeep and rest of all plz answer these question for help some one as soon as possible what is stub area what is transit area let there are three area in ospf a0 a2 and a3 if a2 and a3 is coneted through each other will they comnicate
which defined peer ip address an local subnet belong to crete? (Choose two)
what is meant by wild card mask and why can't we use in eigrp ?
What is the IEEE specification for Spanning Tree Protocol? A.) 802.9 B.) 803.ud C.) 803 D.) 802.1d
What is difference between fast ethernet and ethernet port?
13 Answers Bank of Baroda, Bank Of India,
Cisco routers use wildcard masking to identify how to check or ignore corresponding IP address bits. What does setting a wildcard mask bit to 0 cause the router to do? A. It tells the router to check the corresponding bit value. B. It tells the router to ignore the corresponding bit value. C. It tells the router to check its alternate routing list. D. It tells the router to use its primary routing list.
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.