Why subnetting is used?
No Answer is Posted For this Question
Be the First to Post Answer
Which command successfully pings an individual IP address? A. Router> ping 192.5.5.0 B. Router# ping 192.5.5.30 C. Router> ping 192.5.5.256 D. Router# ping 192.5.5.255
Which range of possible numbers do standard ipx access lists have? A. 100 199 B. 600 699 C. 800 899 D. 1000-1099
Which commands would assign and enable IPX on an interface ? A.) enable netware B.) enable novell-ether C.) router#(config)ipx routing D.) You must first enable IPX globally and then assign the network number to the interface . E.) enable ipx F.) router#(config-if)ipx network 4a
What is the command to copy the IOS image to a TFTP server? A.) copy flash tftp B.) copy running-config tftp C.) copy ios tftp D.) copy startup-config tftp
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
What are the steps of data encapsulation?
To monitor IP igrp traffic, you can use "debug IP igrp transaction" or "debug IP igrp events". How do you display information about IPX routing update packets? A. debug routing B. debug ipx transaction C. debug ipx routing activity D. debug ipx events
Which of the following use PVCs at layer 2? A.) X.25 B.) HDLC C.) Frame relay D.) ISDN
What is Route Poisoning?
in stead of 0.0.0.0 wild card mask what u can write after ip?
Sequence and acknowledgement numbers are used for? A.) Layer transitioning B.) Flow control C.) Port number addressing D.) Reliability
why we use AS no. in IGRP and EIGRP?