What is the attenuation?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

What is the cladding?

0 Answers  


What does the following series of commands accomplish? router igrp 71 network 10.0.0.0 router igrp 109 network 172.68.7.0 A. It isolates networks 10.0.0.0 and 172.68.7.0. B. It loads igrp for networks 109 and 71. C. It disables RIP. D. It disables all routing protocols.

1 Answers  


What is the beaconing?

0 Answers  


How many types of ips?

0 Answers  


What are the two most common request/reply pair with ICMP messages when using the ping command? (Choose two) A. echo reply B. echo request C. source quench D. fragment onset E. information redirect F. destination reachable G. echo control message

1 Answers  






Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection oriented protocol that acknowledges receipt of data packets and is considered reliable

2 Answers  


Which layer is responsible for framing? A.) Application B.) Data Link C.) Physical D.) Network E.) Transport

3 Answers  


Which command switches from User mode to Privileged mode? A.) login B.) privilege C.) admin D.) enable E.) enter F.) root

5 Answers  


Completely describe the steps based on OSI Model, what happens when you enter the address http://google.com in browser?? Summarize the complete steps based on layered OSI approach.

3 Answers   Cisco, Intel, TCS, Trimble Navigation,


What are characteristics of UDP A. It is reliable and acknowledged B. It is unreliable and acknowledged C. It is reliable and unacknowledged D. It is unreliable and unacknowledged

2 Answers  


Which is not a common problem with Distance-Vector routing? A.) Slow convergence. B.) Complex configuration. C.) Routing loops. D.) Periodic updates can slow convergence. E.) Counting to infinity.

1 Answers  


Access lists are numbered. Which of the following ranges could be used for an IP access list? A. 600 - 699 B. 100 - 199 C. 1 - 99 D. 800 - 899 E. 1000 - 1099

1 Answers  


Categories