What is the purpose of the Data Link?
No Answer is Posted For this Question
Be the First to Post Answer
in stead of 0.0.0.0 wild card mask what u can write after ip?
Can you explain what IPSec is
Hey Folks how are you i guess some of guys are newly visitors of this site so let me introduce my self. I am jitendera kumar sinha working for cisco system (india)( Network engineer L2) and i was also a regular Visitors of this site and i have provided lots of answer and i do not know how many are correct :-) By the way i am here again to learn some thing and share my knowledge which is beyond CCNA Scope and and it is some where related to ccnp ( switching )and ccnp Security as i am pursuing ccnp security so i am going to start the topics from switching and will share my knowledge and try to brush-up my knowledge.... so let me know any topic in switching where you are facing difficulty and i will try to solve it so please post one topic and i will reply weekly as i am getting time on Sunday only
Identify the command that displays the SAP table? A.) show ipx servers B.) display SAP table C.) display SAP's D.) show sap table
what is the matric of EIGRP protocol?
What are three benefits of Integrated Services Digital Network (ISDN) (Choose three) A. PVCs are faster and more reliable B. No specialized equipment is required C. Data transfer is faster than typical modems D. Call setup is faster than with standard telephone service E. It carries many types of data tramp such as voice video and data
What does the IPX maximum-path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)
What is true about Link-State protocols? A.) They maintain a more complex table than distant vector protocols B.) They maintain a less complex table than distant vector protocols C.) They use routing ports D.) The maintain backup copies of the IOS
Which command do you use to set the Privileged mode password to 'clearwater'? A.) set password=clearwater B.) enable privilege password clearwater C.) enable password clearwater D.) enable login clearwater E.) enable secret password clearwater F.) ebable clearwater
Which of the following are characteristics of UDP? A.) UDP is connection oriented. B.) UDP is used with TFTP. C.) UDP is unreliable. D.) UDP is connectionless. E.) UDP is at the transport layer. F.) UDP uses no acknowledgements.
What is the protocol number for UDP? A.) 6 B.) 17 C.) 25 D.) 21
What information is provided by the local management interface (LMI)? A.) LMI encapsulation type B.) The current DLCI values C.) The status of virtual circuits D.) The global or local significance of the DLCI values