Why is network segmentation a good idea when managing a large network?
No Answer is Posted For this Question
Be the First to Post Answer
What command can you type to view the connections after telneting into multiple routers simultaneously? A.) sh users B.) sh ports C.) sh host D.) sh sessions
What is quality of ipv6?
Tell me which multicast ip eigrp protocol use?
Q: why are switch trunking modes ( dynamic auto , dynamic desirable )used in switch while trunking? if only negotiation is the factor it can be done with one mode as well ie dynamic desirable . but why we need dynamic auto. coz it dsnt negotiates ..at all please post answer asap thanks :
What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.
How many maximum paths you can give on latest ios in rip?
Which two physical interfaces support PPP? (Choose two) A. Ethernet B. Token Ring C. Synchronous serial D. Asynchronous serial
Which OSI layer performs code conversion, code formatting and encryption? A.) Physical B.) Data-Link C.) Application D.) Transport E.) Presentation F.) Network
Hi all, suppose more than two network administrators are configure same router with different configuration through telnet at the same time.. then whose(admin's) configuration will use router for routing ?
Why Authentication Header (AH) is not compatible with the network that using NAT?????? Jitu, looking for u specially...!!!! U knw why i m looking for u..!!!
What are the different types of cables that are used in routing?
Identify the order of the 5 step encapsulation? 1. Create the segment 2. Convert the frame to bits 3. Create the packet 4. Create the frame 5. User creates the data A.) 1,2,4,2,5 B.) 2,1,3,4,5 C.) 5,1,3,4,2 D.) 5,3,4,1,2