answersLogoWhite

0

Cisco

Cisco Systems, Inc. is a major IT company, which produces networking equipment and network management solutions for both personal and commercial use. Questions about this company and its products belong here.

1,095 Questions

Full form of cisco?

Wikipedia: Cisco Systems, Inc. (NASDAQ: CSCO, SEHK: 4333) is a multinational corporation headquartered in San Jose, California, that designs and sells consumer electronics, networking, voice, and communications technology and services. Cisco has more than 70,000 employees and annual revenue of US$ 40.0 billion as of 2010. The stock was added to the Dow Jones Industrial Average on June 8, 2009, and is also included in the S&P 500 Index, the Russell 1000 Index, NASDAQ 100 Index and the Russell 1000 Growth Stock Index.

Which of the following commands sets the secret password to Cisco?

In the global configuration mode, type enable secret <password of preference>

See below example:

Router>enable

Router#configure terminal

Enter configuration commands, one per line. End with CNTL/Z.

Router(config)#enable secret password

Router(config)#exit

Router#

Is the computer a data terminal equipment?

Data Terminal Equipment (DTE)

A Data Terminal Equipment (DTE) is a communication device that is the source or destination of signals on a network, typically a terminal or a computer. It communicaties with the data circuit-terminating equipment and can perform all the required functions necessary to permit users to communicate.

When the destination network is not listed in the routing table of a cisco router what two possible actions the router might take?

The router discards the packet.

The router forwards the packet out the interface indicated by the default route entry.

What is port security in cisco?

port security is a CLI command used to restrict access to a network from a cisco switch by allowing access only to the hosts whose MAC addresses are defined in the switch. except the allowed hosts remaining hosts will be blocked based on the violation mode chosen.

Which encapsulates segment into packets?

TRANSPORT LAYER

The transport layer ensures that messages are delivered error-free, in sequence, and with no losses or duplications. It relieves the higher layer protocols from any concern with the transfer of data between them and their peers.

The size and complexity of a transport protocol depends on the type of service it can get from the network layer. For a reliable network layer with virtual circuit capability, a minimal transport layer is required. If the network layer is unreliable and/or only supports datagrams, the transport protocol should include extensive error detection and recovery.

The transport layer provides:

  • Message segmentation: accepts a message from the (session) layer above it, splits the message into smaller units (if not already small enough), and passes the smaller units down to the network layer. The transport layer at the destination station reassembles the message.
  • Message acknowledgment: provides reliable end-to-end message delivery with acknowledgments.
  • Message traffic control: tells the transmitting station to "back-off" when no message buffers are available.
  • Session multiplexing: multiplexes several message streams, or sessions onto one logical link and keeps track of which messages belong to which sessions (see session layer).

Typically, the transport layer can accept relatively large messages, but there are strict message size limits imposed by the network (or lower) layer. Consequently, the transport layer must break up the messages into smaller units, or frames, prepending a header to each frame.

The transport layer header information must then include control information, such as message start and message end flags, to enable the transport layer on the other end to recognize message boundaries. In addition, if the lower layers do not maintain sequence, the transport header must contain sequence information to enable the transport layer on the receiving end to get the pieces back together in the right order before handing the received message up to the layer above.
Network Layer

What is the mission statement of CISCO?

Cisco ... enables people to make powerful connections - whether in business, education, philanthropy, or creativity. Cisco hardware, software, and service offerings are used to create the Internet solutions that make networks possible-providing easy access to information anywhere, at any time."

Where can you buy a VPN router?

A BEFSX41 router can be purchased at Best Buy, Radio Shack, Walmart, Target and any other store that carries electronic and computer equipment. Used routers can be found on Amazon.

Where might one find information about Cisco Systems Inc?

The best place to go to read on Cisco Systems Inc in to go to the Cisco website. That would give the most accurate information. But one could also go to Wikipedia. Althought it has good information, some of it may not be entirely accurate.

What is the transport layer protocol used in VOIP?

Transport layer TCP/IP Protocols are TCP and UDP

Which cable is use for similar device?

A crossover cable is necessary for two similar devices to talk to each other without the use of an intervening network connectivity device because the transmit and receive signals must be crossed between the two devices.

This is what a hub or switch would normally do. If a normal, straight through cable were to be used it would connect the transmit signal to the transmit signal on the other device, which is equivalent to two people talking to each other at the same time with no way to listen to what they are saying.

With a crossover cable the transmit signal on one end is connected to the receive signal on the other end so the two devices can talk and listen to each other.

What are the technical specifications of the Cisco 3825 Integrated Services Router?

The Cisco 3825 Integrated Services Router consist of wired connectivity, three types of remote management protocol, and preinstalled firewall protection. The product is no longer supported so exercise caution when purchasing it.

What is a computer system's organization?

Storing and managing information is an important task of the computer system. Since the information plays an important role in a computer system, its logical and physical characteristics are also a matter of interest as these effect the efficiency of programs using it.

Computer system are comprised of input devices, output devices, processing devices, and storage devices. Input devices would include a keyboard, mouse, microphone, sound card (if it uses a microphone), and read-only storage devices. Output devices would include the video card, monitor, sound card, and speakers. Processing devices would include the CPU, and the FPU. The video and sound cards could be considered processing devices, since they also process images, video, and sound. Storage devices would include ROM, RAM, memory sticks, memory cards, the hard drive, and CD/DVD burners.

Which events will cause the VTP revision number on a VTP server to change?

Adding, modifying, or removing a VLAN from the VTP server will cause the revision number to change. Another possible way is if a Client gets a higher revision number than the server. If this happens the server will take take the revision number and the VLAN information from the client and advertise the information to everyone in the VTP domain.

What services are offered by the Cisco Academy?

The Cisco Networking Academy provides training on construction and maintenance of networks. This includes courses for specific certifications, such as Cisco CCNA and Cisco CCNP. The training is done through various partner organizations that provide the necessary space, instructors, etc. More information can be found on the Cisco website.

How does cisco work?

Cisco routing can work through a number of ways. Some of these ways include the usage of a network switch. Also, the usage of a multicast NAT connection may be necessary to route the signals from Cisco.

How many types of routers are there?

Routers are primarily used for creating extended computer networking and communication support. There are many types of routers based on customers dynamic needs and usability. The most common type of routers are those for home and small office use.

Following are the most commonly adopted types of routers addressing all sorts of unique customer demands from home use up to large scale businesses.

  • Edge Routers
  • Subscriber Edge Routers
  • Core Routers
  • Boundary Routers
  • Backbone Routers

What are the two protocols used in the transport layer?

TCP and UDP

Correct:

UDP (User Data-gram Protocol) is a communications protocol that offers a limited amount of service when messages are exchanged between computers in a network that uses the Internet Protocol.

UDP provides two services not provided by the IP layer. It provides port numbers to help distinguish different user requests and, optionally, a checksum capability to verify that the data arrived intact.

TCP (Transmission Control Protocol) is a set of rules (protocol) used along with the Internet Protocol (IP) to send data in the form of message units between computers over the Internet. While IP takes care of handling the actual delivery of the data, TCP takes care of keeping track of the individual units of data (called packets) that a message is divided into for efficient routing through the Internet. (TCP/IP) is the know definition by most.

What is a Cisco 2811 router used for?

There are several things that a Cisco Router 2811 can do for you, including you connect to the internet. It has features such as: security, voice support, 2 integrated Ethernet ports, enhanced network module slots and enhanced investment protection.

What are the functional areas of business organizations?

Examples of functional areas include:

Client services

 Operations

 Finance

 Human Resources

 Marketing

 Administration and IT Support

How do you unlock config tab in cisco packet tracer?

how to unlock the config tab in packet tracer