2. What are the valid ways to segment a LAN? (Choose all
that apply)
A. Repeater
B. Bridge
C. Switch
D. Router
Answers were Sorted based on User's Feedback
Answer / kapilasdhir
Answer: B, C, D
Repeaters do not segment the network, but rather extend the
distance a LAN can run
| Is This Answer Correct ? | 7 Yes | 4 No |
What are the things that can be accessed in a CISCO router’s identifying information?
What is the difference between cross cable and straight cable?
hello friend i have answerd more time of your question or doute.now i am seeing towards you for help,plz send the soln before monedya the problem is i have three router r1 and r2 and r3 they are conested in that maneer thai is r1---r2---r3---server | | server bothe server have diffrent ip now i have to implemnt access list on the r3 router in such a way that user from r1 can access only one server while user from r2 can access whole servre i ahve done it but both user of r1 and r2 uses all server i need help please help me this time? i have repalsced my firwall by r3 router so bacicaly i have to implement it on my firewall but you tell me on cisco router please help
hi shain can u send me some detail about bgp so that i can enhance my knowledge over bgp and can you also teach me about the process of suppernating. now what i am thinking that this could be last visit on that site overhere.so please mail that short of thing on my gmail id i am requesting to all of the visitor that please send theire doubt or question to my new gmail id which is jitendera.ccnainterview@gmail.com.i will try to solve it if i am capable to do it Wishing all of you for great future Jitendera kaumar sinha
Describe ICMP messages
what is meant by wild card mask and why can't we use in eigrp ?
Which OSI layer incorporates the MAC address and the LLC? A.) Data link B.) Network C.) Physcial D.) Transport
Your company has been assigned the IP address of 201.222.5.0 and require having 20 subnets. As the company’s network administrator, find the following: a) the subnet mask (2 marks) b) the number of useable subnets (2 marks) c) the subnetwork address for the 4th subnet (2 marks) d) the first usable IP address for the 4th subnet (2 marks) e) the last usable IP address for the 4th subnet (2 marks) f) the broadcast address for the 4th subnet. (2 marks)
Which two steps are required to confound and apply standard access lists on an interface? (Choose two) A. define an access list number and its parameters B. enable an interface to become part of the access list group C. define the number of access lists to be supported on an interface D. copy the access list definition to each interface that will support it
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port
Identify the protocol to test connectivity without configuring any layer 3 protocols? A.) TCP B.) Ping C.) IP D.) CDP E.) Telnet
Identify the OSI layer which is responsible for end-to-end connections? A.) Network B.) Transport C.) Session D.) Data link E.) TCP