Dear Mr.Shahin thank you very much for your advise i realy
thanks full to you.
Best of luck
Answers were Sorted based on User's Feedback
Answer / jitu
Dear mr shain
know u become a tech guru.so plse also
advise be about one question that
wrong number kabhi engae koi nahi hota hai?
that is why wrong number never be engage
answer it ha ha aha
Is This Answer Correct ? | 0 Yes | 1 No |
In port based access-list which command u give instead of ip?
How much hold down time of eigrep protocol?
hi shyam i am putting urs question here I am facing one problem in my layer 2 switch I don’t know the problem is on switch side or client side. The problem is some PC (not all) are stop participate in LAN they don’t send or recd. Packet from switch and if I check RJ45 (with LAN tester)from PC side the packet and 8 pin wire is working fine and after that process of LAN tester I plug RJ 45 in PC now PC start recd/ send packets what is the problem I don’t understand even client side no virus found RJ45 is ok and switch has no problem bcoz other PC is working fine Cable (cat 5 ) is also fine bcoz I didn’t crimp again just check in LAN tester and start working fine. Plz any one solve this matter. And after lan tester process pc is working fine and after 2 or 3 hour it again start same problem and again same process lan tester I have used
Which of the following is a connectionless protocol at the Transport layer? A.) UDP B.) ARP C.) ICMP D.) RARP E.) IP F.) FTP
Windowing is a type of : A.) Negative acknowledgement B.) Address resolution C.) Layer transition mechanism D.) Flow control
When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.
Hey Folks how are you i guess some of guys are newly visitors of this site so let me introduce my self. I am jitendera kumar sinha working for cisco system (india)( Network engineer L2) and i was also a regular Visitors of this site and i have provided lots of answer and i do not know how many are correct :-) By the way i am here again to learn some thing and share my knowledge which is beyond CCNA Scope and and it is some where related to ccnp ( switching )and ccnp Security as i am pursuing ccnp security so i am going to start the topics from switching and will share my knowledge and try to brush-up my knowledge.... so let me know any topic in switching where you are facing difficulty and i will try to solve it so please post one topic and i will reply weekly as i am getting time on Sunday only
what is the high order bit in class a 1 11 110 10 mine answer 1
Brielfly explain the conversion steps in data encapsulation
What does the show protocol display?
If a router uses static routing, how does it learn the route to remote networks? The router uses a RIP request to obtain remote network numbers. The router uses a routing protocol to exchange remote network numbers. The router uses DNS request packets to obtain remote network numbers. The Network Administrator manually configures the remote networks.
Which two statements about IP RIP are true? (Choose two) A. It limits hop counts to 31 B. It is a link state routing protocol C. It uses autonomous system numbers D. It is capable of load sharing over multiple paths E. It uses bandwidth as the metric for path selection F. It broadcasts updates every 30 seconds by default