What are the different types of cables that are used in routing?
No Answer is Posted For this Question
Be the First to Post Answer
Identify the command to configure the configuration-register? A.) Router# config-register 0x2102 B.) Router(config)# config-register 0x2102 C.) Router(config-reg)# 0x2102 D.) Router> config-register 0x2102
Identify the administrative distance and appropriate routing protocol? A.) RIP = 255, IGRP = 100 B.) RIP = 100, IGRP = 120 C.) RIP = 1, IGRP = 0 D.) RIP = 120, IGRP = 100
How many access lists are allowed per interface? A. One per port, per protocol B. Two per port, per protocol C. Unlimited D. Router interface +1 per port.
Why is network segmentation a good idea when managing a large network?
Windowing is a type of? A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
In stp which protocol is used for detrming root port root bridge ,forwarding port and blocking port
Define the virtual path?
What does the IPX maximum path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)
What is the administrative distance for IGRP? A.) 90 B.) 120 C.) 110 D.) 100
You are a system administrator and you want to deny access to a group of computers with addresses 172.30.16.0 to 172.30.31.0. Which wildcard mask would you use? A. 0.0.15.255 B. 0.0.255.255 C. 0.0.31.255 D. 0.0.127.255 E. 0.0.255.255
Which Standard IP Access list commands will deny only the source address 1.1.1.1? A.) access-list 9 deny host 1.1.1.1 B.) access-list 9 deny 1.1.1.1 255.255.255.0 C.) access-list 9 deny 1.1.1.1 0.0.0.0 D.) access-list 9 deny 1.1.1.1 0.255.255.255 E.) access-list 9 deny 1.1.1.1 255.255.255.255