Explain the term 'unicast'.
No Answer is Posted For this Question
Be the First to Post Answer
Which frame has a Type field to identify the upper-layer protocol? A.) 802.3 B.) 802.2 C.) 802.5 D.) Ethernet_II
You are logged into a router, what command would show you the IP addresses of routers connected to you? A. show cdp neighbors detail B. show run C. show neighbors D. show cdp
What do the following commands accomplish? access-list 1 permit 172.16.0.0 0.0.255.255 interface ethernet 0 IP access-group 1 out interface ethernet 1 IP access-group 1 out A. Only traffic from the source network 172.16.0.0 will be blocked. B. Only traffic from the source network 172.16.0.0 will be forwarded. Non-172.16.0.0 network traffic is blocked. C. Non-172.16.0.0 traffic will be forwarded. D. All traffic will be forwarded.
Identify the command to display the IP routing table? A.) show route B.) show ip route C.) show ip table route D.) show ipx route
Which protocol will send a message to routers if a network outage or congestion occurs? A.) ARP B.) TCP C.) IP D.) ICMP
How many maximum paths you can give on latest ios in rip?
What is a characteristic of Store and Forward switches? A.) They forward the frame before it is completely read. B.) They work at wire speed. C.) They are the same a Cut-Through switching. D.) They read the entire frame and check CRC before forwarding. E.) They decrease latency.
Identify the hardware component used to store buffers, tables, running-configuration etc? A.) NVRAM B.) ROM C.) RAM D.) Flash
Identify 2 features of X.25? A.) Supports only IP B.) Utilizes switched and permanent virtual circuits C.) Contains minimal flow control and error recovery D.) Utilizes LAPB as it's data-link protocol
What is refresher?
Which layer of the 7 layer model is responsible for representing the application information between 2 different OS's? For example, converting ASCII to EBCIDIC. A.) Transport B.) Application C.) Physical D.) Session E.) Presentation F.) Network
An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.