What is the virtual path?
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
When discussing static routes, what is the gateway parameter used for? A.) Determining the dynamic route B.) Defining the subnet C.) Defining the Administrative Distance D.) Determining the next hop
Hi Anyone can share the latest ICND1 (640-822)dumps updated at 30 september 2009. specialy to Jatendra if you have any updated about the ICND1 exam.will be remain thankful.
Mention what is the difference between dynamic ip and static ip addressing?
Tell me when we use extended access-list?
How do you go to privileged mode? How do you switch back to user mode?
What is a digital certificate?
Explain protocol?
the situation iz like ths -at a specific time in our company the internet connectivity goes off...v hav two networks in our company...but out of it only one link goes down for 5-10 sec...a fastethernet port becomes down for few sec and automatically becomes Up... Is this occures becoz of Power?? If yes thn y the 2nd network is not affected??
What is an advantage of LAN segmentation? A.) Increases broadcasts. B.) Increases collisions. C.) Provides more protocol support. D.) Decreases broadcasts. E.) Routing protocol support.
Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM
What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.