What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates? Router (config-if) # no routing Router (config-router) # no routing updates Router (config-if) # passive-interface Router (config-router) # passive-interface s0 TRUE ANSWER : ? YOUR ANSWER : ?
What should the configuration register value be after you successfully complete the password recovery procedure and return the router to normal operation? 0x2100 0x2142 0x2102 0x2101 TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following is true when describing a unique local address? These addresses are meant for nonrouting purposes, but they are almost globally unique so it is unlikely they will have an address overlap. These are your typical publicly routable addresses, just like a regular publicly routable address in IPv4. These are like private addresses in IPv4 in that they are not meant to be routed. Packets addressed to a unicast address are delivered to a single interface. TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following are layers in the TCP/IP model?1. Application2. Session3. Transport4. Internet5. Data Link6. Physical 2, 3 and 5 1 and 2 1, 3 and 4 3, 4 and 5 TRUE ANSWER : ? YOUR ANSWER : ?
You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router? (config-if)# blocksales ip access-list in (config)# ip access-group 110 in (config-if)# ip access-group 110 in (config-if)# ip access-group Blocksales in TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following technique is used for encapsulation? a technique used by protocols in which a lower level protocol accepts a message from a higher level protocol and places it in the data portion of the low level frame. None of these a technique used in best-effort delivery systems to avoid endlessly looping packets. One of the pieces that results when an IP gateway divides an IP datagram into smaller pieces for transmission across a network that cannot handle the original datagram size All of these TRUE ANSWER : ? YOUR ANSWER : ?
When two computers communicate with each other, they send information back and forth. If they are separated by a reasonable distance, they can send and receive the information through a direct cable connection which is called a null-modem connection. Presently what is the maximum distance in metres permitted in this null-modem connection? 150 None of these 30 80 100 TRUE ANSWER : ? YOUR ANSWER : ?
The MAC (Media Access Control) address of the network card is used in both Ethernet and Token-Ring networks and is essential for communication. What does MAC provide? A logical address that identifies the workstation An alias for the computer name A physical address that is assigned by the manufacturer The logical domain address for the workstation A physical address that is randomly assigned each time the computer is started TRUE ANSWER : ? YOUR ANSWER : ?
What does the acronym ISDN stand for? Intelligent Services Digital Network Integrated Services Data Network Indian Standard Digital Network None of these Integrated Services Digital Network TRUE ANSWER : ? YOUR ANSWER : ?
Which of the following is an IEEE standard for frame tagging? 802.3U ISL 802.1Q 802.3Z TRUE ANSWER : ? YOUR ANSWER : ?