What are the different types of the password used in securing a cisco router?
How would you configure one host name that points to two IP addresses? A. IP host jacob 1.0.0.5 2.0.0.8 B. IP jacob 1.0.0.5 2.0.0.8 C. IP host jacob 1.0.0.5 D. IP host duplicate "all"
what is difference between subnet-mask and wildcard mask?
Explain what is 5-4-3 rule?
Identify 3 IP routing protocols? A.) RIP B.) AURP C.) OSPF D.) IGRP E.) ARP F.) ICMP
Why do we have a Layered Model? 1) It reduces complexity 2) Allows for a standardized interface 3) Facilitates modular engineering 4) Ensures interoperable technology 5) Accelerates evolution 6) Simplifies teaching and learning
When using TCP, after a session is open, the applications can adjust the amount of segments they receive before sending an acknowledgment. This behaviour is known as ______________. FCS Windowing MTU adjustment Flexible Send Path
Using the TCP/IP protocol suite a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses RARP requests D. It uses a router lookup table
what is telnet,ssh?? what is the perpose of this? wer r this configured and how to configured??
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
What is the routing metric used by RIP? A.) Route poisoning B.) Split horizon C.) Hop Count D.) TTL
What is cam?
router