I simulate ten routers r1 to r10 straightly. I want I can ping from the loop of r1 to loop of r10, but I want I cant ping r1 and r10 from inside routers.?
No Answer is Posted For this Question
Be the First to Post Answer
Which LAN switching method is used in CISCO Catalyst 5000?
Which 3 statements describe default encapsulation and LMI type configuration? A.) There are only four encapsulations and 3 LMI type options B.) The LMI type config term options C.) In release 11.3 the LMI type is autosensed D.) The default LMI is Cisco E.) IETF encap must be configured unless the connecting routers are both cisco
Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector
If a router uses dynamic routing, how does it learn the route to remote networks? The router uses a DHCP request to obtain remote network numbers. The router uses a routing protocol to exchange routing info. with other routers. The router uses DNS request packets to obtain remote network numbers. The Network Administrator manually configures the remote networks.
Identify the purpose of the wildcard mask? A.) Match a certain portion of the IP address while ignoring the rest of the address B.) Determine the class of the IP address C.) Determine the network portion of an IP address D.) Hide the host portion of an IP address
HOW MPLS IS DIFFERENT FROM OSPF? WHY NOW A DAYS MPLS IS PREFERED OVER ANY NETWORK PROTOCOL?
What port does rip use?
Which IEEE standard is used to define Wi-Fi? A. IEEE 802.3 B. IEEE 802.5 C. IEEE 802.11h D. IEEE 802.11c E. IEEE 802.11
Using the access-list command, 'access-list 1 deny 2.2.2.2', what else must be done to stop host 2.2.2.2 from sending any traffic out of physical interface E0, while still allowing other traffic? A.) In global mode, Add a line - 'access-list 1 permit 0.0.0.0 255.255.255.255' B.) On interface E0, Add a line - 'access-group 1 in' C.) In global mode, Add a line - 'access-list 1 permit all' D.) On interface E0, Add a line - 'access-list 1 in' E.) On interface E0, Add a line - 'access-list 1 out' F.) On interface E0, Add a line - 'ip access-group 1'
Given the following IP address from the Class C address range 192.168.21.12. Your network plan needs addresses for 28 small prkps Each office uses its own shored. The network design specifies that you confound for five bits of subnetting. When you confound for this in Cisco IOS software which shored mask should you use? A. 255.255.0.28 B. 255.255.255.0 C. 255.255.255.28 D. 255.255.255.248 E. 255.255.255.252
Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config running-config B.) configure nvram C.) copy startup-config running-config D.) configure memory
Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash