CoolInterview.com - World's Largest Collection of Interview Questions
Start Your Own website Now
Sponsored Links

Interview Questions
Our Services

Get 9,000 Interview Questions & Answers in an eBook.


  • 9500+ Pages
  • 9000 Question & Answers
  • All Tech. Categories
  • 14 MB Content

    Get it now !!



    Send your Resume to 6000 Companies


  • INTERVIEW QUESTIONS CISCO CERTIFICATION EXAMS CCNA CERTIFICATION EXAM DETAILS
    Question :
    Which of the following protocols are examples of TCP/IP network access layer protocols? (Choose two)
    Ethernet
    HTTP
    IP
    UDP
    SMTP
    TCP
    PPP


    Posted by: Ghassan on 10/14/2010

    Contact Ghassan Contact Ghassan
    Category CCNA Certification Exam Interview Questions
    Rating (0.3) By 153 users
    Added on 10/14/2010
    Views 370
    Rate it!
    Answers:

    1.IP
    2.UDP
    3.TCP
    Because of Tcp/ip which is a 4&3 layer protocols so that we only use these protocols



    Posted by: nandhakuar    

    Contact nandhakuar Contact nandhakuar

    If you have the better answer, then send it to us. We will display your answer after the approval.
    Rules to Post Answers in CoolInterview.com:-

  • There should not be any Spelling Mistakes.
  • There should not be any Gramatical Errors.
  • Answers must not contain any bad words.
  • Answers should not be the repeat of same answer, already approved.
  • Answer should be complete in itself.
  • Name :*
    Email Id :*
    Answer :*
    Verification Code Code Image - Please contact webmaster if you have problems seeing this image code Not readable? Load New Code
    Process Verification  Enter the above shown code:*
    Inform me about updated answers to this question

       
    Related Questions
    View Answer
    What is the function of the Cisco IOS command ip nat inside source static
    10.1.1.5 172.35.16.5?
    A. It creates a global address pool for all outside NAT transactions.
    B. It establishes a dynamic address pool for an inside static address.
    C. It creates dynamic source translations for all inside local PAT transactions.
    D. It creates a one-to-one mapping between an inside local address and an inside global address.
    E. It maps one inside source address to a range of outside global addresses.
    View Answer
    What can a network administrator utilize by using PPP Layer 2
    encapsulation? (Choose three.)
    A. VLAN support
    B. compression
    C. authentication
    D. sliding windows
    E. multilink support
    F. quality of service
    View Answer
    Which two statements best describe the wireless security standard that is
    defined by WPA? (Choose two.)
    A. It specifies use of a static encryption key that must be changed frequently to enhance security.
    B. It requires use of an open authentication method.
    C. It specifies the use of dynamic encryption keys that change each time a client establishes a connection.
    D. It requires that all access points and wireless devices use the same encryption key.
    E. It includes authentication by PSK.
    View Answer
    What is the maximum data rate specified for IEEE 802.11b WLANs?
    A. 10 Mbps
    B. 11 Mbps
    C. 54 Mbps
    D. 100 Mbps
    View Answer
    How should a router that is being used in a Frame Relay network be
    configured to avoid split horizon issues from preventing routing updates?
    A. Configure a separate sub-interface for each PVC with a unique DLCI and subnet assigned to the
    sub-interface.
    B. Configure each Frame Relay circuit as a point-to-point line to support multicast and broadcast traffic.
    C. Configure many sub-interfaces on the same subnet.
    D. Configure a single sub-interface to establish multiple PVC connections to multiple remote router interfaces.
    View Answer
    What should be part of a comprehensive network security plan?
    A. Allow users to develop their own approach to network security.
    B. Physically secure network equipment from potential access by unauthorized individuals.
    C. Encourage users to use personal information in their passwords to minimize the likelihood of passwords
    being forgotten.
    D. Delay deployment of software patches and updates until their effect on end-user equipment is well known
    and widely reported.
    E. Minimize network overhead by deactivating automatic antivirus client updates.

    View Answer
    Which three statements are correct about RIP version 2? (Choose three.)
    A. It has the same maximum hop count as version 1.
    B. It uses broadcasts for its routing updates.
    C. It is a classless routing protocol.
    D. It has a lower default administrative distance than RIP version 1.
    E. .It supports authentication
    F. It does not send the subnet mask in updates.
    View Answer
    Which type of attack is characterized by a flood of packets that are
    requesting a TCP connection to a server?
    A. denial of service
    B. brute force
    C. reconnaissance
    D. Trojan horse
    View Answer
    Which two statements are true about the command ip route 172.16.3.0
    255.255.255.0 192.168.2.4? (Choose two.)
    A. It establishes a static route to the 172.16.3.0 network.
    B. It establishes a static route to the 192.168.2.0 network.
    C. It configures the router to send any traffic for an unknown destination to the 172.16.3.0 network.
    D. It configures the router to send any traffic for an unknown destination out the interface with the address
    192.168.2.4.
    E. It uses the default administrative distance.
    F. It is a route that would be used last if other routes to the same destination exist.
    View Answer
    Which of the following describe the process identifier that is used to run
    OSPF on a router? (Choose two.)
    A. It is locally significant.
    B. It is globally significant.
    C. It is needed to identify a unique instance of an OSPF database.
    D. It is an optional parameter required only if multiple OSPF processes are running on the router.
    E. All routers in the same OSPF area must have the same process ID if they are to exchange routing
    information.
    View Answer
    What is the maximum data rate specified for IEEE 802.11b WLANs?
    A. 10 Mbps
    B. 11 Mbps
    C. 54 Mbps
    D. 100 Mbps
    View Answer
    What is the maximum data rate specified for IEEE 802.11b WLANs?
    A. 10 Mbps
    B. 11 Mbps
    C. 54 Mbps
    D. 100 Mbps
    View Answer
    While troubleshooting a connectivity problem, a network administrator
    notices that a port status LED on a Cisco Catalyst series switch is alternating green and amber. Which
    condition could this indicate?
    A. The port is experiencing errors.
    B. The port is administratively disabled.
    C. The port is blocked by spanning tree.
    D. The port has an active link with normal traffic activity.
    View Answer
    On point-to-point networks, OSPF hello packets are addressed to which
    address?
    A. 127.0.0.1
    B. 172.16.0.1
    C. 192.168.0.5
    D. 223.0.0.1
    E. 224.0.0.5
    F. 254.255.255.255
    View Answer
    Refer to the exhibit. Assuming that the router is configured with the default
    settings, what type of router interface is this?
    A. Ethernet
    B. FastEthernet
    C. Gigabit Ethernet
    D. asynchronous serial
    E. synchronous serial
    View Answer
    41 In order to allow the establishment of a Telnet session with a router, which
    set of commands must be configured?
    A. router(config)# line console 0
    router(config-line)# enable password cisco
    B. router(config)# line console 0
    router(config-line)# enable secret cisco
    router(config-line)# login
    C. router(config)# line console 0
    router(config-line)# password cisco
    router(config-line)# login
    D. router(config)# line vty 0
    router(config-line)# enable password cisco
    E. router(config)# line vty 0
    router(config-line)# enable secret cisco
    router(config-line)# login
    F. router(config)# line vty 0
    router(config-line)# password cisco
    router(config-line)# login
    View Answer
    While troubleshooting a network connectivity problem, a technician
    observes steady link lights on both the workstation NIC and the switch port to which the workstation is
    connected. However, when the ping command is issued from the workstation, the output message
    "Request timed out." is displayed. At which layer of the OSI model does the problem most likely exist?
    A. the session layer
    B. the protocol layer
    C. the data link layer
    D. the access layer
    E. the network layer
    F. the application layer
    View Answer
    Which two values are used by Spanning Tree Protocol to elect a root
    bridge? (Choose two.)
    A. amount of RAM
    B. bridge priority
    C. IOS version
    D. IP address
    E. MAC address
    F. speed of the links
    View Answer
    In the implementation of VLSM techniques on a network using a single
    Class C IP address, which subnet mask is the most efficient for point-to-point serial links?
    A. 255.255.255.0
    B. 255.255.255.240
    C. 255.255.255.248
    D. 255.255.255.252
    E. 255.255.255.254
    View Answer
    Which are entry points in your network through which a virus attack is possible? (Choose two)
    A. Printer
    B. Memory
    C. Tape backups
    D. Internet gateways
    E. External storage media

    View Answer


    Please Note: We keep on updating better answers to this site. In case you are looking for Jobs, Pls Click Here Vyoms.com - Best Freshers & Experienced Jobs Website.

    View ALL CCNA Certification Exam Interview Questions

    User Options
    Sponsored Links


    Copyright ©2003-2014 CoolInterview.com, All Rights Reserved.
    Privacy Policy | Terms and Conditions

    Download Yahoo Messenger | Placement Papers| FREE SMS | ASP .Net Tutorial | Web Hosting | Dedicated Servers | C Interview Questions & Answers

    Testing Articles | Testing Books | Testing Certifications | Testing FAQs | Testing Downloads | Testing Interview Questions | Testing Jobs | Testing Training Institutes


    Cache = 0.014999 Seconds