Across
- 2. The measure of the transfer of bits across the media over a given period of time.
- 4. Contention-based access method that is used on Wireless LANs.
- 6. What is unreachable if Code 2 for ICMPv4 is shown?
- 8. Contention-based access method that is used on legacy bus-topology Ethernet LANs
- 11. This EXEC mode is the "view only" mode.
- 13. Key that is used to complete a partial command name entry.
- 17. The current configuration and settings of a device.
- 18. WAN topology that is considered to provide the highest availability.
- 19. The amount of time for data to travel from one point to another.
- 20. The banner ___ command provides a legal notification when a device is accessed.
- 24. Service command that ensures passwords are encrypted
- 25. This EXEC mode allows access to all commands and features.
Down
- 1. The capacity at which a medium can carry data.
- 3. The Up Arrow key ____ the previous command in the history buffer.
- 5. The measure that assess the transfer of usable data
- 7. There are ____ destination unreachable codes for ICMPv6.
- 9. Part of the command structure that is not predefined
- 10. What does a device ping if a loopback address is pinged?
- 12. Cisco proprietary cable.
- 14. Testing utility that uses ICMP echo request and echo reply messages.
- 15. Ethernet cable used to interconnect similar devices.
- 16. Utility that generates a list of hops that were successfully reached along the path.
- 21. What does copy running-config startup-config do?
- 22. The disturbance caused by EMI or RFI.
- 23. Part of the command structure that is a specific defined parameter.
