What is collision?
No Answer is Posted For this Question
Be the First to Post Answer
What requirements should a VPN fulfill?
while trouble shooting a network conectivty prob a technician observes that steady link light on the both work stations nic and the switch port which the workstation is conected.however when the ping comand is issuede from the work station the out message is request time out at which layer of osi model does the prob most likly exist 1 sessiom layer protocol layer datalink kayer acess layer network layer application layer i have ansered n/w layer but i am niot sure i have also posted privous question jitendera kumar sinha
Tell me how much internal and external ad of eigrp protocol?
Hi Gyes, here is new question. can you provide answer of following question Like linux, can we windows as router? If yes how can we able to do this,
Identify 2 reasons for disabling CDP? A.) If the router is not configured for RIP B.) Save bandwidth by eliminating overhead C.) If the router is configured for Appletalk D.) When connected to a non-Cisco router
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
switch kitne volt per work karta hai. what is frame realy. what is isdn and pri and bri.
What is the name of best path in eigrp protocol?
Why would you use static routing instead of dynamic routing? A.) When you want automatic updates of the routing tables B.) All the time C.) When you have very few routes and want to conserve bandwidth D.) When you have a gateway of last resort
What is the result of using a hierarchical addressing framework? A. increased availability of addresses B. decreased distance between routers C. increased router memory requirements D. no need to maintain routing information
What does a Standard IP Access-list use as test criteria? A.) IP source address B.) IP source and destination address, protocol numbers and port numbers C.) IPX source and destination address D.) Source MAC address
Which addresses are valid host addresses? A. 201.222.5.17 B. 201.222.5.18 C. 201.222.5.16 D. 201.222.5.19 E. 201.222.5.31