A big part of the overhead on a network is broadcasts. You
divide a large number of hosts into smaller individual
networks and separate them with the proper device
According to proper networking terminology you have created
separate _______________________,
User Domains
Broadcast Domains
Collision Areas
Broadcast Areas
What would be the proper wildcard mask to permit all odd numbered hosts on the 10.48.0.0/12 network? access-list 1 permit 10.48.0.0 0.15.255.255 access-list 1 permit 10.48.0.1 0.15.255.254 access-list 1 permit 10.48.0.0 0.15.255.1 access-list 1 permit 10.48.0.0 0.0.0.254 access-list 1 permit 10.48.0.0 0.0.0.255
Hi Everyone,i have done b.e. and i am CCNA certified, i am searching jobs related to ccna. Although i don't have experience in networking field, i found very difficult to search job(posted my resume in all job portals). I am very much interested to work in networking field, please guide me, my mail id: karnailthakur@gmail.com; Please let me know any company taking ccna freshers(Preferably delhiNCR location). Thanks guys...
What is the size of ipv6?
What must be true for two routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D.) Configured for PPP
Which three devices can be used to convert the user data from the DTE into a form acceptable to the WAN service's facility? A. Modem B. CSU/DSU C. TA/NT1 D. CO E. SS7
How we can find ASBR Router, we have no authentication to enter router?
When setting up a WAN network, everything outside of the Demarc is not owned by the customer. Which of the following are not owned by the customer? A.) The T1 line. B.) LAN C.) The Router D.) DTE E.) PC's F.) CO
Which peer authentication method and which ipsec mode is used to connect to the branch locations? (Choose two)
What layer can optionally support reliability? A.) Transport B.) IP C.) Physical D.) Network E.) Sub-physical layer
How do we do encryption and authentication in L2F?
What are the advantages of a layered model in the networking industry?
How do you find valid hosts in a subnet?