www.howtonetwork.org

CCNA & CCNP Certifcation Training

  • About
  • Contact
  • FAQ
  • Join
  • Home
  • CCNA
    • ICND1
    • ICND2
    • 101 CCNA LABS
  • CCNP
    • ROUTE
    • SWITCH
    • TSHOOT
    • 101 CCNP LABS
  • CompTIA
    • Security+
    • Network+
  • Design
    • CCDA
    • CCDP
You are here: Home / ICND1 / Day 28 – Review 13 / Day 28 Exam

Day 28 Exam

  1. What are the three methods used to control data flow at Layer 4?
  2. Switches contain a memory chip known as an _______, which builds a table listing of which device is plugged into which port.
  3. Name the two trunk link encapsulation types.
  4. Which command will encrypt a password with level 7 encryption?
  5. Convert 192.160.210.177 into binary (without using a calculator).
  6. NAT converts the _______ headers for incoming and outgoing traffic and keeps track of each session.
  7. Name the three types of IPv6 addresses . . .

    The content below this message is for members only.

About Us

This is a free bonus site for members of www.howtonetwork.com

Copyright

The content on this copyright Reality Press Ltd.
Copyright Reality Press Ltd.