Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Define the virtual path?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Suppose a Switch interface went in error-dis mode what you will do for Troubleshooting List all Possibilities

0 Answers   Infosys,


Identify the command to display all the valid commands at the given mode? A.) Help all B.) Help C.) All commands D.) ?

2 Answers  


Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) Privileged exec is a subset of the user exec mode C.) They both require the enable password D.) User exec is a subset of the privileged exec mode

1 Answers  


what is diffrence between circit switching and packet switching

1 Answers   HCL, Volvo,


hi everybody anybody have doubts in ccna please contact with me we will provide the solutions of the networking questions.my contact no. is 9885382098,abdulkhalid.5@gmail.com.

2 Answers  


Hi Jitendera, I continuously read your answers which is more knowlegable than books... Q.I am facing some problems in subnetting.can you plzz explain the subnetting process.. will be remain thankful

4 Answers  


3. What does a bridge use to segment a network? A. IP Addresses B. Broadcasts C. Application data D. Media Access Control addresses

2 Answers  


Which Standard IP Access list commands will deny only the source address 1.1.1.1? A.) access-list 9 deny host 1.1.1.1 B.) access-list 9 deny 1.1.1.1 255.255.255.0 C.) access-list 9 deny 1.1.1.1 0.0.0.0 D.) access-list 9 deny 1.1.1.1 0.255.255.255 E.) access-list 9 deny 1.1.1.1 255.255.255.255

5 Answers  


what is different between semi-managed and managed Switch ?

2 Answers  


What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos

1 Answers  


What are the different layers of osi model?

0 Answers  


What are the different ways authentication mechanism in VPN?

0 Answers   CCIE,


Categories