What command will display the line, protocol, DLCI, and LMI information of an interface?
Answer: B
The show interface command shows the line, protocol, DLCI, and LMI information of an interface.
Enter details here
If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000bps serial link?
Answer: D
The clock rate command is two words, and the speed of the line is in bps.
Enter details here
The structure or format of data is called:
Answer: A
Semantics defines how a particular pattern to be interpreted, and what action is to be taken based on that interpretation.
Enter details here
What are the two main types of access control lists (ACLs)?
1.Standard
2.IEEE
3.Extended
4.Specialized
Answer: D
Standard and extended access control lists (ACLs) are used to configure security on a router.
Enter details here
What command is used to create a backup configuration?
Answer: B
The command to back up the configuration on a router is copy running-config startup-config.
Enter details here
In computer network nodes are _________
Answer: D
Explanation: In a computer network, a node can be anything that is capable of sending data or receiving data or even routing the data to its destination. Routers, Computers and Smartphones are some examples of network nodes.
Enter details here
Where is a hub specified in the OSI model?
Answer: B
Hubs regenerate electrical signals, which are specified at the Physical layer.
Enter details here
To back up an IOS, what command will you use?
Answer: D
The command copy flash tftp will prompt you to back up an existing IOS in flash to a TFTP host.
Enter details here
Bluetooth is an example of __________
Answer: A
Explanation: Bluetooth is a wireless technology used to create a wireless personal area network for data transfer up to a distance of 10 meters. It operates on 2.45 GHz frequency band for transmission.
Enter details here
Network congestion occurs _________
Answer: A
Explanation: Network congestion occurs when traffic in the network is more than the network could handle. To avoid network congestion, the network management uses various open-loop and closed-loop congestion control techniques.
Enter details here