Q:

How many bits are in an IPv6 address field?

A) 24 B) 16
C) 32 D) 128
 
Answer & Explanation Answer: B) 16

Explanation:

There are 16 bits (four hex characters) in an IPv6 field.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA - CISCO Certification

0 6487
Q:

To enable OSPFv3, which of the following would you use?

A) Router1 (config - if) # ipv6 ospf 10 area 0.0.0.0 B) Router1 (config - if) # ipv6 router rip 1
C) Router1 (config - if) # ipv6 router eigrp 10 D) Router1 (config - if) # ospf ipv6 10 area 0
 
Answer & Explanation Answer: A) Router1 (config - if) # ipv6 ospf 10 area 0.0.0.0

Explanation:

To enable OSPFv3, you enable the protocol at the interface level as with RIPng. The command string is ipv6 ospf proces-id area area-id.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA - CISCO Certification

0 6434
Q:

Which layer of the OSI model offers three different modes of communication : Simplex, half duplex, and full duplex?

A) Presentation B) Transport
C) Application D) Session
 
Answer & Explanation Answer: D) Session

Explanation:

The Session layer of the OSI model offers three different modes of communication : Simplex, half duplex, and full duplex.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA - CISCO Certification

1 6387
Q:

Which OSI layer defines the standards for cabling and connectors?

A) Layer 1 B) Layer 4
C) Layer 7 D) Layer 3
 
Answer & Explanation Answer: A) Layer 1

Explanation:

OSI layer 1 defines the standards for cabling and connectors.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA - CISCO Certification
Job Role: Network Engineer

10 6317
Q:

To use VLSM, what capability must the routing protocols in use possess?

A) Support for multicast B) Multi-protocol support
C) Transmission of subnet mask information D) Support for unequal load balancing
 
Answer & Explanation Answer: C) Transmission of subnet mask information

Explanation:

To use VLSM, the routing protocols in use possess the capability to transmit subnet mask information.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA - CISCO Certification

0 6205
Q:

Your company wants to reconfigure a Catalyst 2950. Which actions must be taken to erase the old configuration?(Choose three)

A. Erase flash
B. Restart the switch
C. Delete the VLAN database
D. Erase the startup configuration

Answer

Answer: B  C  D

Report Error

View answer Workspace Report Error Discuss

2 6155
Q:

What is the most common attack on a network today?

A) Lock picking B) Naggle
C) DoS D) auto secure
 
Answer & Explanation Answer: C) DoS

Explanation:

The most common attack on a network today is a denial of service (DoS) because they are the easiest attack to achieve.

Report Error

View Answer Report Error Discuss

Filed Under: CCNA - CISCO Certification

0 5933
Q:

Which layer defines how data is formatted , presented, encoded, and converted for use on the network?

Answer

The presentation layer makes sure that data is in a readable format for the Application layer.

Report Error

View answer Workspace Report Error Discuss

11 5899