What is ping used for?
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
Which two statements about a bridge are true? (Choose two) A. A bridge floods multicasts B. A bridge floods broadcasts C. A bridge does not flood multicasts D. A bridge does not flood broadcasts
Hi Everyone,i have done b.e. and i am CCNA certified, i am searching jobs related to ccna. Although i don't have experience in networking field, i found very difficult to search job(posted my resume in all job portals). I am very much interested to work in networking field, please guide me, my mail id: karnailthakur@gmail.com; Please let me know any company taking ccna freshers(Preferably delhiNCR location). Thanks guys...
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
How do you set the encapsulation type to PPP for an interface? A.) encap ppp B.) ppp encapsulation C.) encapsulation ppp D.) encapsulation ppp enable E.) ppp enable encapsulation
Which three types of connectors are commonly associated with Cisco's V.35 serial cables? (Choose three.) 0 RJ 11 1 DB 60 2 Winchester 15 pin 3 DB 9 4 smart serial 5 RJ 45
What is a network subnet?
What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos
Can Anybody tell me if I wanna block all MP3,video sites from cisco 2600 router,how shall i proceed with ACL's?? Please post the steps for the following alonge with detail. Thanks to you all ..appriciated
What does a router do with a packet that it does not have a destination network for? A.) Sends it to the Serial port B.) Drops the packet C.) Sends it back out the same interface it received it in D.) Forwards the packet to the next hop
Name the command we give on privilege mode for coming back to user execution mode?
What is the subnetmask of / 27 in network based and host based?