logo

CuriousTab

CuriousTab

Discussion


Home Certification CISCO Certification Comments

  • Question
  • What port number is used for DHCP?


  • Options
  • A. 67
  • B. 68
  • C. 69
  • D. Both A and B

  • Correct Answer
  • Both A and B 


  • CISCO Certification problems


    Search Results


    • 1. What are the six OSPF route types?
    • Discuss
    • 2. What are the purposes of areas in an OSPF network?
    • Discuss
    • 3. Explain the difference between the forwarding of a unicast IP packet and the forwarding of a multicast IP packet.
    • Discuss
    • 4. Which of the following describes the creation of private networks across the Internet, enabling privacy and tunneling of non-TCP/IP protocols?

    • Options
    • A. HDLC
    • B. Cable
    • C. VPN
    • D. IPSec
    • Discuss
    • 5. If you want to disable STP on a port connected to a server, which command would you use?

    • Options
    • A. disable spanning-tree
    • B. spanning-tree off
    • C. spanning-tree security
    • D. spanning-tree portfast
    • Discuss
    • 6. What does a firewall?

    • Options
    • A. Examines packets and decides which ones should be allowed to pass from one network to another.
    • B. Maintains a table which maps the IP addresses of two network so that packets can be redirected between the networks.
    • C. Compares packets to virus signatures so that packets which are know to be dangerous can be identified and stopped.
    • D. Prevents viruses from moving any further through a network
    • Discuss
    • 7. Which of the following devices do not operate at all levels of the OSI model?

    • Options
    • A. Network management stations (NMSs)
    • B. Routers
    • C. Web and application servers
    • D. Network hosts
    • Discuss
    • 8. Acknowledgments, sequencing , and flow control are characteristics of which OSI layer?

    • Options
    • A. Layer 2
    • B. Layer 3
    • C. Layer 4
    • D. Lawer 7
    • Discuss
    • 9. Which layer chooses and determines the availability of communicating partners along with the resources necessary to make the connection, coordinates partnering applications, and forms a consensus on procedures for controlling data integrity and error recovery?
    • Discuss
    • 10. What is the bit length and expression form of a MAC address?
    • Discuss


    Comments

    There are no comments.

Enter a new Comment