What are the possible ways of data transmission in ccna?
No Answer is Posted For this Question
Be the First to Post Answer
What is the difference between named and extended acl?
What is the default size of a standard ping on a Cisco router? * A: 100 bytes * B: 32 bytes * C: 10 bytes * D: 16 bytes
Write an access list line which will deny node 20.0.2.1 to anywhere on your network using DNS via UDP. Don't worry about the other access list lines.
Which two of the following protocols are used at the Transport layer? A.) ARP B.) UDP C.) ICMP D.) RARP E.) TCP F.) BootP
Write out a config to permit only the below MAC address to pass traffic through a port on your switch. mac-address 0005.1b00.5b58
In stp which protocol is used for detrming root port root bridge ,forwarding port and blocking port
completly describe th steps fo osi model when you enter http:/youtube.com
Which symbol in the router prompt indicates you are in the privelaged mode? A. > B. ! C. # D. :
What is the most common layer 2 device? A. Hub B. Router C. Switch D. Repeater
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
Which OSI layer provides best effort end to end packet delivery? A.) Data-Link B.) Presentation C.) Network D.) Transport E.) Physical F.) Application
Which statement about the flow control function of TCP is true? A. TCP makes no snarl to check for lost or duplicate data packets B. The application layer must sequence data packets when using TCP C. TCP controls the flow of UDP data through negative acknowledgements (NAK) D. TCP is a connection oriented protocol that acknowledges receipt of data packets and is considered reliable