Tell me why we use filter option?
No Answer is Posted For this Question
Be the First to Post Answer
What does the term "attenuation" mean in data communication? 1 loss of signal strength as distance increases 2 time for a signal to reach its destination 3 leakage of signals from one cable pair to another 4 strengthening of a signal by a networking device
Which protocol gets a hardware address from a known IP address? A.) RARP B.) TCP C.) IP D.) BootP E.) ARP F.) ICMP
Whith the hierarchical numbering of IP addressing what determines the spoon of the address that will identify the network number? A. subnet mask B. dots between octets C. class of the first octet D. assignments of DHCP E. address resolution process
Which addresses are INCORRECTLY paired with their class? A. 1 to 126, Class A B. 128 to 191, Class A C. 1 to 126, Class B D. 128 to 191, Class B
what is standard and extended acess list? what are the commands for extended and acess list?
Which three of the following are true statements about connection-oriented sessions? A.) The segments delivered are acknowledged back to the sender upon their reception B.) Any segments not acknowledged are retransmitted by the receiver C.) A manageable data flow is maintained in order to avoid congestion, overloading and loss of any data D.) Segments are sequenced back into their proper order upon arrival at their destination
You are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem? A. NetWare 4.11 defaults to 802.2 encapsulation. B. NetWare 4.11 defaults to 802.3 encapsulation C. Cisco routers only work with NetWare 3.11. D. NetWare 3.11 defaults to 802.2 encapsulation.
Identify the following command to configure a secret password to 'cisco'? A.) Router(config)#enable password cisco secret B.) Router(config)#enable secret cisco C.) Router(config)#enable secret password cisco D.) Router(config)#set secret = cisco
Identify 3 characteristics of switches? A.) Increase available bandwidth B.) Decrease broadcast traffic C.) Support full duplex in a multipoint topology D.) Make forwarding decision using MAC address E.) Create collision domains
Identify 3 characteristics of a MAC address? A.) Burned into the NIC B.) 48 bits long C.) Length is 32 bits D.) Used to identify a host device E.) Contains a network portion and a host portion
What is the difference between unicast, multicast, broadcast, and anycast?
What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.