After how long eigrp protocol advertise its routing table?
No Answer is Posted For this Question
Be the First to Post Answer
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
Which of the following are Session Layer standards? A.) ASCII and EBCDIC B.) MPEG and MIDI C.) NFS and SQL D.) JPEG and PICT
What is the connection oriented protocol in the TCP/IP protocol stack? A. IP B. UDP C. TCP D. DNS E. OSPF
Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application
Which layer is responsible for flow control, acknowledgement, and windowing? A.) Transport B.) Network C.) Application D.) Session E.) Physical F.) Data Link
What metric does rip use? How is the metric used to indicate an unreachable network?
You want a message to be displayed every time someone tries to log on to the router. Which command is required to accomplish this task? A.) motd#(message)# B.) banner motd(message) C.) banner motd#(message)# D.) banner motd*(message) E.) banner login#(message)#
Which of the following statements are true? A.) Store and forward switching creates variable latency through the switch B.) Cut through switching creates variables latency through the switch C.) Cut through switching works at wire speed D.) Store and forward switching works at wire speed
Which layer is responsible for coordinating communication between systems? A.) Application B.) Network C.) Session D.) Transport E.) Physical F.) Data Link
Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy
Define logical topology.
What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic