What does the command “IP name-server 255.255.255.255″
accomplish?
a.It disables domain name lookup.
b.It sets the domain name lookup to be a local broadcast.
c.This is an illegal command.
d.The command is now defunct and has been replaced by “IP
server-name ip any”
Answers were Sorted based on User's Feedback
Answer / yuvraj
it sets the domain name lookup to be a local broadcast
Is This Answer Correct ? | 2 Yes | 0 No |
Answer / salman
b.It sets the domain name lookup to be a local broadcast.
Is This Answer Correct ? | 1 Yes | 0 No |
Answer / muheed
The command is now defunct and has been replaced by “IP
server-name ip any”
Is This Answer Correct ? | 0 Yes | 0 No |
Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? A. Identification B. Flags C. Frag Offset D. Type of Service E. Total Length
What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data
Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session
Can you explain CHAP?
What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic
what the exact definition of Ethernet.plz reply as soon soon as possible
What will transport layer do when data coming from session layer. They asked about intial operation(3 - way handshake)
What are two ways IPX supports multiple logical networks on an individual underrate? (Choose two) A. network number B. routing protocol C. encapsulation type D. autonomous system number
What are the different types of passwords that you can use in cisco routers?
Which layer is responsible for framing? A.) Application B.) Data Link C.) Physical D.) Network E.) Transport
A routing table contains static, RIP, and EIGRP routes for the same destination network. Which route would normally be used to forward data?
The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC