What is the minimum and maximum request timer?
Tell me how much internal and external ad of eigrp protocol?
What is the command to allow you to type Tokyo instead of the IP address 172.16.30.1 to access a router named Tokyo? A.) config t, ip host Tokyo 172.16.30.1 B.) config t, ip hostname Tokyo 172.16.30.1 C.) config t, hostname Tokyo 172.16.30.1 D.) config t, ip hostname 172.16.30.1 Tokyo
Identify the 3 key features of the Cisco Discovery Protocol? A.) Off by default B.) Will allow for the discovery of layer 3 addresses on neighbor routers C.) Verify connectivity D.) Open standard E.) Does not require any layer 3 protocols to be configured
Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector
Each department has its own file server and the company has an enterprise server that is shared by all departments. What does a network administrator use to provide a secure separation between the management and sales departments? A. a bridge between management and sales B. routers to provide the most secure segmentation C. a hub to provide ease of management and a satisfactory alternative for network security D. an Ethernet switch to maintain secure separationthrough programming the access lists for each port of the switch
What is the default interval for SAP updates? A.) 60 seconds B.) 15 seconds C.) 30 seconds D.) 120 seconds
Identify the command that will display the RIP routes entering and leaving the router? A.) Router(config)# debug ip rip B.) Route# debug ip rip C.) Router>debug ip rip D.) Router# debug rip routes
Identify the command that configures the bandwidth to 56K? A.) Router(config-if)# bandwidth 56000 B.) Router(config-if)# bandwidth 56k C.) Router(config)# bandwidth 56 D.) Router(config-if)# bandwidth 56
What is EIGRP?
Which of the following is true? A. The default is to send debug output to the console screen. B. To view debug output from a telnet session, the "terminal monitor" command must be used C. If the "logging buffered" command is used, the debug output would be sent to RAM and can be viewed with the "show log" command D. If the "no console loggin" command were configured, output would besent to a telnet session E. All of the above F. None of the above G. A, B, and C. H. A, C, D, and E.
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
Which of the following is an example of the Network Layer? A.) TCP B.) IP C.) SQL D.) Token Ring E.) LLC