What is the problem not caused by excessive broadcast traffic on a network segment?
Complex address schemes
Which four are WAN data-link layer protocols?
The most common WAN data-link protocols are:
1. HDLC 2. PPP
3. Frame Relay
4. ATM
How do you write Leave application after taking leave?
It is submitted that, Anila Augustine (My daughter),was not feeling well and caught a chicken pox which rendered her unable to be present at classes
Does a company in Alabama have to give breaks to employees who work on Saturday?
Alabama does not have a law requiring employers to give any breaks to employees no matter what days they work.
...
There is no federal or Alabama state law mandating that an employer must allow for any meal breaks or other breaks, regardless of the day of the week that is worked.
For information on federal labor laws concerning paid breaks, meal breaks and other breaks, see this website:
http:/www.dol.gov/dol/topic/workhours/breaks.htm
For information on Alabama state laws concerning meal breaks or other breaks, see this website:
http://www.humanresourceblog.com/2008/02/05/alabama-break-laws/
Also, here is an additional website that combines information on federal and Alabama state laws into a comprehensive summary:
http://blog.laborlawcenter.com/2006/07/27/alabama-lunch-and-break-law/
rip is short for routing information protcol
it is a routing protocol that shared routing tables from 1 router to another to a maximum of 16 hops of 16 routers
If the sending and receiving protocols are different, then you have a mismatch. Think of a speaker using French but the receiver only understanding Spanish. They will not be able to understand each other, and this is what happens with network protocols.
They can see the communication but have no clue about the content or what to do with the request.
Route table lookup
What is a purpose of the logging synchronous command?
when your working in the switch and suddenly an error occurred that message will simply prompt in the window irrespective of the work your doing it. message may come in the middle of the command or etc. to overcome that we use logging synchronous .simply to prevent the interruption of command text input we use logging synchronous .
What feature was added to RIP to help with synchronization errors?
RIP_JITTER, from Chapter 4:Distance Vector Routing Protocols. This is found in the "Check Your Understanding" questions, page 214.
What is the command used to install a route in a routing table?
R1(Config)#ip route x.x.x.x y.y.y.y z.z.z.z
X will be the source network
Y will be the source network's subnet mask
Z will be the destination network.
*Note you can also set the destination as an outbound interface.
What are three fundemental functions of the physical layer?
What is the purpose of Copy run start command on a Cisco router?
It is short for copy running-config starting-config. Running-config is the configuration of the router as you have modified it and which is currently operating, held in RAM (gone after a reboot), and you copy it to the starting-config which is in NVRAM and gets loaded by the router when it boots/
So essentially you're saving what you have now to the persistent storage so your router will still work after a reboot.
What is Passing Score For CCDE LAB?
The passing score is 80%. In previous versions of the exam, that was a strict 80% on every section; however, in Version 5 of the CCIE Lab exam, that is treated as a weighted average passing score. This should cause candidates to relax a little knowing that if you come "that close" in Troubleshooting, you still have a chance to save the day in the Configuration section.
How many reserved ports are there?
In total there is 65535 UDP/TCP ports allocated . However, the first 1024 port numbers are reserved for common applications such as ftp (20,21), ssh (22), http (80) etc. This means that for other common applications there is "only" 64511 available port numbers.
What is Top Talkers........ how?
Top Talkers is a feature in Cisco IOS software to provided granular statistics regarding traffic patterns traversing specified networked devices, commonly routers but also some switches. A useful tool for monitoring network load
What prompt can you issue show commands to investigate a Cisco Router?
User enable.
router> enable
router#
How much storage does Amazon have?
Not sure about the exact capacity but Amazon Web Services is leading name in storage industry
What is the difference between promiscuous mode and inline mode?
Inline is used to look at a specific location such as between two routers, where as promiscuous mode captures traffic using a capture device such as a hub or switch, this way all traffic that goes through the device is monitored.