What is the name of distance vector algorithm?
No Answer is Posted For this Question
Be the First to Post Answer
When using TCP, after a session is open, the applications can adjust the amount of segments they receive before sending an acknowledgment. This behaviour is known as ______________. FCS Windowing MTU adjustment Flexible Send Path
HI friends mine one of the friends have ask a good question i also donot know the answer so i am putting here Please poet the answer no matter it is wright or wrong put yours view here The question is like that when we are going to configure ospf then there are three way 1st way router ospf 10 netwrok 192.168.1.0 0.0.0.255 area 0 network 192.168.2.0 0.0.0.255 area 0 the 2nd way is like that router ospf 10 netwrok 192.168.0.0 0.0.255.255 area 0 but he inrodused the thrird way like router ospf 10 netwrok 192.168.00000001.0 < ?.?.?.?>area 0 router ospf 10 netwrok 192.168.00000010 <?.?.?.?>area 0 now problem is that what should i put the mask in this way so i puted ? sign Please solve this problem i think this is good one plz donot see for answer please contribute any thing i am reqesting Than you Jitendera kuamr sinha
When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.
6. Which device can create smaller networks and stop broadcast storms by default? A. Repeater B. Bridge C. Router D. Gateway
What is the default size of frame?
What is a back off on an 802.3 networks? A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. It is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged
Hey Folks how are you i guess some of guys are newly visitors of this site so let me introduce my self. I am jitendera kumar sinha working for cisco system (india)( Network engineer L2) and i was also a regular Visitors of this site and i have provided lots of answer and i do not know how many are correct :-) By the way i am here again to learn some thing and share my knowledge which is beyond CCNA Scope and and it is some where related to ccnp ( switching )and ccnp Security as i am pursuing ccnp security so i am going to start the topics from switching and will share my knowledge and try to brush-up my knowledge.... so let me know any topic in switching where you are facing difficulty and i will try to solve it so please post one topic and i will reply weekly as i am getting time on Sunday only
What is the size of an ip address?
Identify 2 features of PPP PAP authentication? A.) Username and password is sent in clear text B.) Authentication messages are sent periodically during the connection C.) More secure than CHAP D.) Remote node is control of authentication process
What is the regional Telco office called, where the customers local loop terminates? A.) Demarc B.) DTE C.) DCE D.) CO E.) CPE
what is the difference between switch and router??
16 Answers Infosys, Precision Techserve, Thomson,
Given the Novell IPX address 1aceb0b.0000.0c12.3456 which part is the network portion of the address? A.) 0000 B.) 1 C.) 3456 D.) 1ace E.) 0000.0c12.3456 F.) 1aceb0b