What are the steps of data encapsulation?
No Answer is Posted For this Question
Be the First to Post Answer
When we use loop back ip?
Hi all, Kindly can you tell me what is demand ccna voice in field and what is profile of ccna voice.so pl very urgent bcz i am going to join institute
When configuring the subnet mask for an IP address, which formats can be used?A. dotted-decimal. B. Hexadecimal C. Bit-count D. Octal E. Binary
What do you understand by redundancy?
In port based access-list which command u give instead of ip?
At which layer of the OSI model does the ping command operate? A. session B. network C. transport D. maintenance
12 Answers EF, IBM, jetking, Nexlinx, Rkd, TCS, Wipro,
Sequence and acknowledgement numbers are used for? A.) Layer transitioning B.) Flow control C.) Port number addressing D.) Reliability
Why we used Virtual MAC in GLBP
What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.
Identify the command that forces the router to load into ROM mode upon a reload? A.) boot system rom B.) rom boot C.) boot system flash rom D.) boot router rom
What is the IEEE specification for Spanning Tree Protocol? A.) 802.9 B.) 803.ud C.) 803 D.) 802.1d
what is distance vector protocol link state protocol and what is the diffrence between them