What is the draw back of eigrp protocol?
No Answer is Posted For this Question
Be the First to Post Answer
What are the different types of passwords that you can use in cisco routers?
Which type of switching reads just the address portion of the frame and then immediately starts forwarding it? A.) Cut-Through B.) Store-and-Forward C.) Tabling D.) Routing E.) Inverse ARP F.) Fast Forward
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance
12 Answers EF, IBM, jetking, Nexlinx, Rkd, TCS, Wipro,
You are given the IP address of 172.16.2.160 with a subnet mask of 255.255.0.0. What is the network address in binary? A. 10101100 00010000 B. 00000010 10100000 C. 10101100 00000000 D. 11100000 11110000
Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation
The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments
When we use loop back ip?
When we use extended access-list?
how many pass word you can configure on cisco 2500 router
there is three mode of vtp let there are three switch s1 in server mode s2 in transparent mede and s3 in clint mode then will that tranparnt mode going to effect the network if yes then how and if no then what it will do
what is the concept of HA and FA in VPN tunneling?