On which interface we always apply access-list?
No Answer is Posted For this Question
Be the First to Post Answer
What is the function of DDR on Cisco routers? A. DDR is dial--on-demand routing. It provides a continuous LAN only connection. B. DDR is dial-on-demand routing. It provides routing for high volume traffic. C. DDR is dial--on-demand routing. It provides a continuous WAN connection. D. DDR is dial-on-demand routing. It provides routing for low volume and periodic traffic.
what is uplink port why are we use this port,this port having extra feature or only use to redundant link or other please explain it ,,,,,,,,,,,,,,,, bcz i am very confuse ..... Thanks
What is an autonomous system?
How loops are introduced in switching? Whats the solution for that.
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
what is vlan and how will you configure vlan on 3650 switch and how many valn can you create on that switch
Which three commands are used to configure information into RAM on a router? (Choose three) A. configure memory B. configure terminal C. configure overwrite D. copy tftp startup-config E. copy running-config startup-config F. copy startup-config running-config
What is the Between Normal Switch and Manageable Switch?
Routers can learn about destinations through static routes, default, or dynamic routing. By default, a router will use information derived from __________. A. IGRP B. RIP C. IP D. TCP
how we update the IOS version with the help of TFTP?
Define network congestion?
What are the three phases of PPP session establishment? A. Link establishment phase B. Authentication phase C. Network layer protocol phase D. Handshake phase E. Dial-in phase