Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What is the size of hello packets in eigrep protocol?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

if 10 pc's connected from internet, in 8 pc's internet is correctly run but in other 2 pc's they can not access internet,what's the problem?

9 Answers   Fibcom, TATA,


Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0

2 Answers  


What is the attenuation?

0 Answers  


Your network uses a Class C address of 210.10.10.0. You must now split up the network into separate shores to handle multiple buildings separated by routers. Which two steps must you take to determine the proper shored mask for your networks? (Choose two) A. determine the number of seperate networks required B. determine how many devices will require DHCP addressing C. determine the maximum number of hosts that will be on each shored D. determine the miniumum number of hosts that will be on each shored E. determine which router will be the IP default gateway for each shored

1 Answers  


Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP

3 Answers  


What is an advantage of UDP? Low Overhead High Overhead Reliable Not reliable

4 Answers  


Which of the follow do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE

1 Answers  


How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain

1 Answers  


Hi all, Kindly can you tell me what is demand ccna voice in field and what is profile of ccna voice.so pl very urgent bcz i am going to join institute

3 Answers  


What is collision?

0 Answers  


Which layer of the 7 layer model provides services to the Application layer over the Session layer connection? A.) Transport B.) Application C.) Session D.) Network E.) Datalink F.) Presentation

2 Answers  


Identify the command to view the configuration-register value? A.) show register B.) display config-register C.) show config D.) show version

1 Answers  


Categories