Explain the matric of eigrp protocol?
No Answer is Posted For this Question
Be the First to Post Answer
How do you find the parameters that you can use with the SHOW command? A.) ? show B.) show ? C.) debug show D.) help E.) sh?
Which protocol you manually enable route summarization?
Explain the difference between flsm and vlsm?
what is difference between hub and switch?
Which of the following statements is false? If your Frame Relay link does not support inverse ARP, you must manually map DLCIs to network Address. One of the major advantages of Frame Relay is its ability to connect to multiple PVCs using only one physical link. DLCI addresses are determined by the network administrator when installing the network. Which of the following statements is false? If your Frame Relay link does not support inverse ARP, you must manually map DLCIs to network Address. One of the major advantages of Frame Relay is its ability to connect to multiple PVCs using only one physical link. DLCI addresses are determined by the network administrator when installing the network. In order for two ends of virtual circuits to communicate using Frame Relay, their network addresses must be mapped to DLCIs.
Which layer hides details of network dependent information from the higher layers by providing transparent data transfer? A.) Transport B.) Physical C.) Data Link D.) Session E.) Application F.) Network
What command can you type to view the connections after telneting into multiple routers simultaneously? A.) sh users B.) sh ports C.) sh host D.) sh sessions
What must be true for two Routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D)Configured for PPP
What does the command "IP name-server 255.255.255.255" accomplish? A. It sets the domain name lookup to be a local broadcast. B. This is an illegal command. C. It disables domain name lookup. D. The command is now defunct and has been replaced by "IP server-name ip any"
Which peer authentication method and which ipsec mode is used to connect to the branch locations?
What is the formula for metric of ospf?
Why we use debug command?