What is the network subnet?
No Answer is Posted For this Question
Be the First to Post Answer
Identify 3 characteristics of an IP address? A.) Contains a network portion and a host portion B.) 32 bits long C.) Unique to each network D.) Part of the default Cisco configuration E.) Referred to as the hardware address
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
which utility should use to test whether TCP/IP has been initialized on a system.friends plz post the answer with explaination..
What does the meaning of <cr >?
What is a back off on an 802.3 networks? A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. It is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged
Which information must a router know in order to perform proper and pungent routing? A. destination application of an incoming packet B. number of other packets in a single flow of data C. destination network address of an incoming packet D. number of routers that also know a path to the destination
Which of the following do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE
How do you find the parameters that you can use with the SHOW command? A.) ? show B.) show ? C.) debug show D.) help E.) sh?
What is the Network Layer of the OSI responsible for? A.) Bridging B.) Routing packets through an internetwork C.) Regenerating the digital signal D.) Gateway services
Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM
What are the Timer of RIP, IGRP, EIGRP and OSPF Routing Protocol?
When you enter router passwords during the setup dialog what is the difference between enable and the enable secret passwords? A. The enable password is encrypted B. The enable secret password uses IPSec password authentication C. The enable secret password cannot be seen as clear text when viewing the configuration D. The enable secret password acts as a backup in case the enable password is compromised