What is subnetting and why it is use?
No Answer is Posted For this Question
Be the First to Post Answer
How do we do encryption and authentication in L2F?
Identify 3 characteristics of IP RIP? A.) Distance vector B.) Administrative distance is 120 C.) Periodic updates every 60 seconds D.) Uses a composite metric E.) Can load balance
Which IP packet field will prevent endless loops? type-of-service identificationf lags time-to-live header checksum
Which protocol resolves an IP address to a MAC address? A.) DHCP B.) RARP C.) ARP D.) NBP E.) DNS
What are the three phases of PPP session establishment? A. Link establishment phase B. Authentication phase C. Network layer protocol phase D. Handshake phase E. Dial-in phase
Dear Mr. JITENDERA KUAMR SINHA how are and how is your family? Anyway can u send me your personal email address?
Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed
To which layer ICMP belongs
raid can be used in? 1 NT 2 Netware 3 all of above mine answer -NT
What is the command to manually enter a static route? A.) IP route network B.) IP route C.) IP route < destination network> D.) IP route
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
What is the name of distance vector algorithm?