logo

CuriousTab

CuriousTab

Discussion


Home Certification CISCO Certification Comments

  • Question
  • Which two descriptions are correct about characteristics of IPv6 unicast addressing? (Choose two) A. Global addresses start with 2000::/3. B. Link-local addresses start with FF00::/10. C. Link-local addresses start with FE00:/12. D. There is only one loopback address and it is ::1.


  • Correct Answer
  • : A , D Explanation: An IPv6 Unicast address identifies a single network interface The Internet Protocol delivers packets sent to a unicast address to that specific interface 


  • CISCO Certification problems


    Search Results


    • 1. A default Frame Relay WAN is classified as what type of physicalnetwork? A: broadcast point-to-multi point B: broadcast multi-access C: non broadcast multi-access D: non broadcast multi-point
    • Discuss
    • 2. Convert the following from binary format to decimal IP address. 11001100.00110011.10101010.01010101
    • Discuss
    • 3. What is the purpose of flow control?

    • Options
    • A. To ensure that data is retransmitted if an acknowledgment is not received
    • B. To reassemble segments in the correct order at the destination device
    • C. To provide a means for the receiver to govern the amount of data sent by the sender
    • D. To regulate the size of each segment
    • Discuss
    • 4. Why is BGP a better choice for Internet routing than the IGPs?
    • Discuss
    • 5. By default , what type of trust are all Windows 2000 trust relationships within a domain tree or forest?

    • Options
    • A. Explicit trust
    • B. One-way trust
    • C. Transitive trust
    • D. Non-transitive trust
    • Discuss
    • 6. You want to implement a mechanism that automates the IP configuration, including IP address, subnet mask, default gateway, and DNS information. Which protocol will you use to accomplish this?

    • Options
    • A. SMTP
    • B. SNMP
    • C. DHCP
    • D. ARP
    • Discuss
    • 7. What does the command confreg 0x2142 provide?

    • Options
    • A. It is used to restart the router
    • B. It is used to bypass the configuration in NVRAM
    • C. It is used to enter ROM monitor mode
    • D. It is used to view the lost password
    • Discuss
    • 8. If you want to disable STP on a port connected to a server, which command would you use?

    • Options
    • A. disable spanning-tree
    • B. spanning-tree off
    • C. spanning-tree security
    • D. spanning-tree portfast
    • Discuss
    • 9. Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols?

    • Options
    • A. HDLC
    • B. Cable
    • C. VPN
    • D. IPSec
    • Discuss
    • 10. Explain the difference between the forwarding of a unicast IP packet and the forwarding of a multicast IP packet.
    • Discuss


    Comments

    There are no comments.

Enter a new Comment