Differentiate User Mode from Privileged Mode?
what is burst rate
Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connnection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding
Cisco's implementation of ISDN BRI has multi protocol support, SNMP MIB support, and what other features? A.) Call waiting B.) Compression C.) ADSL D.) 1.544 Mbps E.) Call screening F.) Negative 'G' support
what command you must use if you want to delete or remove the configuration data that is stored in the NVRAM?
What is the igp (interior gateway protocol)?
Which command will display adjacent routers found by the Cisco Discovery Protocol? A.) show all B.) show cdp entry C.) show ip neighbors D.) show cdp neighbor detail E.) show cdp neighbor F.) show neighbor
Name a major component of the Point-to-Point Protocol (PPP) to negotiate and set up control options on the WAN data link. A.) RFC 1661 B.) High Level Datalink Protocol (HDLC) C.) Challenge Handshake Authentication Protocol (CHAP) D.) SS7 E.) Link Control Protocol (LCP)
What is the default IPX Ethernet encapsulation? A.) SNAP B.) Arpa C.) 802.2 D.) Novell-Ether E.) SAP
What is true when using DDR? A.) HDLC is the preferred encapsulation B.) You must use static routing C.) You should use dynamic routing D.) You should use ISDN
Explain the matric of eigrp protocol?
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.