What is the network subnet?
No Answer is Posted For this Question
Be the First to Post Answer
What type of transmission bus topology support?
There is an emergency fall-back 'skeleton' IOS stored in read only memory on all Cisco routers. What command would make the router load the IOS from Read Only Memory? A.) reload rom B.) boot system rom C.) load ios bootflash D.) load ios rom E.) bootsystem skeleton
Which OSI layer provides mechanical, electrical & procedural specifications for activating, maintaining physical link? A.) Presentation B.) Network C.) Application D.) Physical E.) Transport F.) Data-Link
Why is UDP lease favored when compared to TCP?
Identify the definition of demarcation? A.) Date in which the WAN service contract expires B.) Cabling which extends from the WAN service provider to the customer C.) Division of responsibility, where the CPE ends and the local loop begins D.) Equipment which is located at the customer premises
What is the update period for rip?
The Cisco IOS is stored where? A.) ROM B.) CD C.) Flash D.) NVRAM
What is the beaconing?
Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? A. ICMP B. UDP C. TCP D. TFTP E. FTP
Which two does 100BaseT use? A.) CSMA/CD B.) IEEE 802.5 C.) 802.3u D.) Switching with 53-byte cells
Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it
Which of the following is True regarding passwords on a Cisco router? A. All passwords can be encrypted B. All passwords can be entered using the set-up dialogue C. A password can be set before a user can enter the privileged mode D. A password can be set for individual lines E. TACACS or Radius password authentication can be used.