What is loop back ip in ipv6?
No Answer is Posted For this Question
Be the First to Post Answer
What is the Network Layer of the OSI responsible for? A.) Bridging B.) Routing packets through an internetwork C.) Regenerating the digital signal D.) Gateway services
Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport
Why we using Tcp/IP. Why we can't use just Tcp ip? What is the meaning of '/' symbol in between this?
How the STP determinw that which Port should be Root Port, which port should be Designeted Port , Blocking Port and Forwarding Port in Layer 2 STP topology........ Hi friends Thanks for posting the answer of above given questions i agree with all of you that BPDU is the Protocol that are used to determine this is clear to me.. But I want to Know the Process like Why it Blocked the port Fa0/1 Insted of Fa0/2 waiting for Answer Posting .... Thanks in Advance
Which statement should you use to deny FTP access (only) from network 210 93 105 0 to network 223 8 151 0? A. access list 1 deny 210 93 105 0 0 0 0 0 any eq ftp access list 1 permit any B. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp C. access list 100 deny ip 223 8 151 0 0 0 0 255 any eq ftp access list 100 permit hp any any D. access list 100 deny tcp 210 93 105 0 0 0 0 255 223 8 151 0 0 0 0 255 eq ftp access list 100 permit ip any any
Identify IPX GNS and it's purpose? A.) Go Network Server - sends a print job to a network server B.) Get Nearest Server - locate the nearest server C.) Guaranteed Network Services - allocates resources to users D.) Get Notes Server - locates Domino Server
Hi all, Kindly can you tell me what is demand ccna voice in field and what is profile of ccna voice.so pl very urgent bcz i am going to join institute
You need to come up with a TCP/IP addressing scheme for your company. How many network IDs must you allow for when you define the subnet mask for the network? A.) One for each WAN link B.) One for each router interface C.) One for each NIC installed in each client D.) One for each subnet with hosts E.) One for each host ID
What is the terminal emulation?
Which NetWare protocol provides link-state routing? A. NLSP B. RIP C. SAP D. NCP
what is stp.
Which command assigns the login password CISCO on the console terminal line? A. line vty 0 login password cisco B. line console login password cisco C. line login terminal password cisco D. line console 0 login E. line console 0 login password cisco