Answer Posted / jitu
han bhia nikhil
actualy if you use 0.0.0.xxx(1 to 255) then it will act as
wild mask bit
and you can use it
1 ospf routing protocol
2 access list
| Is This Answer Correct ? | 0 Yes | 0 No |
Post New Answer View All Answers
What is formula of hold down time of eigrp protocol?
What are the things that can be accessed in a CISCO router’s identifying information?
Explain the difference between half-duplex and full-duplex?
What is the frame relay, in which layer it comes?
1>What do you mean by Networks and Networking? 2>Difference between Vlan And Sub Interface Vlan? 3>What is Fiber Optic Media Converter? 4>What is Firewall? 5>Difference Between Layer2 and Layer3 Switch? 6>What is the function of Multilayer Switch? 7>Expalin STP? What is the Difference between STP and MST? 8>What is the Function of VTP?Explain the modes of VTP? 9>What kind of Message VTp will Send? 10>What is the Difference between Normal and Manageable Switch? 11>Difference between Local Vlan and End to End Vlan? 12>Difference between Distance Vector and Link State Routing protocol? 13>What do you mean by Backbone Fast Port? 14>what is Root Guard and BPDU Guard?
What do you understand by ‘protocol’ in networking?
Can you explain VPN tunneled packet in detail?
Explain the types of communication in ipv6 ?
What is topology in ccna?
What are the different layers of osi model?
Which cable we connect in db-9?
Which type of transmission bus topology support?
Differentiate between broadcast domain and collision domain
What is trigger rip and from which ios version it starts?
what's the difference between Symmetric and Asymmetric cryptosystem?