<<= Back Next =>>
You Are On Multi Choice Question Bank SET 1553

77651. Where is a hub specified in the OSI model?





77652. What does the passive command provide to dynamic routing protocols?





77653. Which protocol is used to send a destination network unknown message back to originating hosts?





77654. How often are BPDUs sent from a layer 2 device?





77655. How many broadcast domains are created when you segment a network with a 12-port switch?





77656. What does the command routerA(config)#line cons 0 allow you to perform next?





77657. Which router command allows you to view the entire contents of all access lists?





77658. Which class of IP address has the most host addresses available by default?





77659. In a network with dozens of switches, how many root bridges would you have?





77660. What PPP protocol provides dynamic addressing, authentication, and multilink?





77661. What is a stub network?





77662. If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000bps serial link?





77663. Which one of the following is true regarding VLANs?





77664. What does a VLAN do?





77665. What is the main reason the OSI model was created?




77666. How many collision domains are created when you segment a network with a 12-port switch?





77667. What command will display the line, protocol, DLCI, and LMI information of an interface?





77668. Which protocol does Ping use?





77669. Which command is used to upgrade an IOS on a Cisco router?





77670. If you wanted to delete the configuration stored in NVRAM, what would you type?





77671. What protocols are used to configure trunking on a switch? VLAN Trunking Protocol VLAN 802.1Q ISL





77672. How long is an IPv6 address?





77673. What flavor of Network Address Translation can be used to have one IP address allow many users to connect to the global Internet?





77674. What are the two main types of access control lists (ACLs)? Standard IEEE Extended Specialized





77675. What command is used to create a backup configuration?





77676. You have 10 users plugged into a hub running 10Mbps half-duplex. There is a server connected to the switch running 10Mbps half-duplex as well. How much bandwidth does each host have to the server?





77677. The basic function of voltage stabilizer is to provide:





77678. A food mixture rated for 240V AC fails to start when it is switched on.Which one of the following is NOT a cause for the above?





77679. In a transformer the leakage flux may be minimized by:





77680. Which one of the following connections is preferred for three-to-two phase conversion?





77681. The phase relationship between primary and secondary terminal voltage of a transformer is:





77682. What command will permit SMTP mail to only host 1.1.1.1?





77683. You want to create a standard access list that denies the subnet of the following host: 172.16.50.172/20. Which of the following would you start your list with?





77684. What router command allows you to determine whether an IP access list is enabled on a particular interface?





77685. You have created a named access list called Blocksales. Which of the following is a valid command for applying this to packets trying to enter interface s0 of your router?





77686. You want to create a standard access list that denies the subnet of the following host: 172.16.144.17/21. Which of the following would you start your list with?





77687. You configure the following access list: access-list 110 deny tcp 10.1.1.128 0.0.0.63 any eq smtp access-list 110 deny tcp any eq 23 int ethernet 0 ip access-group 110 out What will the result of this access list be?





77688. You want to create a standard access list that denies the subnet of the following host: 172.16.198.94/19. Which of the following would you start your list with?





77689. If you wanted to deny all Telnet connections to only network 192.168.10.0, which command could you use?





77690. The no load primary current Io in an ideal transformer is:





77691. Which of the following access lists will allow only HTTP traffic into network 196.15.7.0?






77692. Which of the following are valid ways to refer only to host 172.16.30.55 in an IP access list? 172.16.30.55 0.0.0.255 172.16.30.55 0.0.0.0 any 172.16.30.55 host 172.16.30.55 0.0.0.0 172.16.30.55 ip any 172.16.30.55





77693. If you wanted to deny FTP access from network 200.200.10.0 to network 200.199.11.0 but allow everything else, which of the following command strings is valid?





77694. Which of the following series of commands will restrict Telnet access to the router?





77695. Which of the following commands connect access list 110 inbound to interface ethernet0?





77696. Which of the following is true regarding access lists applied to an interface?





77697. Which command would you use to apply an access list to a router interface?





77698. Which of the following is an example of a standard IP access list?





77699. You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?





77700. You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?





<<= Back Next =>>
Terms And Service:We do not guarantee the accuracy of available data ..We Provide Information On Public Data.. Please consult an expert before using this data for commercial or personal use | Powered By:Omega Web Solutions
© 2002-2017 Omega Education PVT LTD...Privacy | Terms And Conditions