What is the subnet? Why is it used?
No Answer is Posted For this Question
Be the First to Post Answer
what is subnetting?
Explain what is route poisoning?
Which of the follow do not belong to the customer? A.) CO B.) DCE C.) Router D.) CPE E.) Demarc F.) DTE
What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
Identify the 3 Internet layer IP protocols? A.) NetBios B.) IPX C.) ARP D.) IP E.) RARP
'Show cdp neighbors detail' show the following 3 pieces of information? A.) Hardware platform B.) Software version C.) Same as 'show version' command D.) Up to 1 address for each protocol E.) Non-direct connected routers
In stp which protocol is used for detrming root port root bridge ,forwarding port and blocking port
Define the virtual channel?
Which of the following is True regarding passwords on a Cisco router? A. All passwords can be encrypted B. All passwords can be entered using the set-up dialogue C. A password can be set before a user can enter the privileged mode D. A password can be set for individual lines E. TACACS or Radius password authentication can be used.
What is 10base2 ethernet lans?