Which of the following will apply IPX sap access list 1010 for incoming traffic, assume you are at the interface configuration? A.) ipx input-sap-filter 1010 in B.) ipx input-sap-filter 1010 C.) ipx access-group 1010 in D.) ipx access-list 1010 in
2 4180What command can you type to view the connections after telneting into multiple routers simultaneously? A.) sh users B.) sh ports C.) sh host D.) sh sessions
1 3871Which of the following is a valid extended IP access-list? A.) router(config)# access-list 101 permit tcp host 172.16.30.0 any eq 21 log B.) router# access-list 101 permit tcp host 172.16.30.0 any eq 21 log C.) router(config)# access-list 101 permit any any 172.16.30.0 D.) router(config)# access-list 101 permit ip host 172.16.30.0 any eq 21 log
2 11377What is the command to manually enter a static route? A.) IP route network B.) IP route C.) IP route < destination network> D.) IP route
4 6583What 2 commands verify end to end communications? A.) Trace B.) debug ip session C.) Ping D.) Route
2 4132Your Ethernet interface currently has the IP address of 1.1.1.1/24. You would like it to have a second IP address of 2.2.2.2/24. Which command will do that? A.) ip address 1.1.1.1 2.2.2.2 255.255.255.0 B.) ip address 2.2.2.2 255.255.255.0 secondary C.) ip address 2.2.2.2 255.255.255.0 D.) This cannot be done, you can only have 1 IP address per physical interface. E.) ip address 2.2.2.2 /24
1 3824Which command listed below sets the banner message when someone connects to the router? A.) message # B.) banner # C.) login banner # D.) description # E.) login description # F.) banner motd #
2 5155What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
1 4304Identify the command to display the IP routing table? A.) show route B.) show ip route C.) show ip table route D.) show ipx route
1 4738Identify the command to display all the valid commands at the given mode? A.) Help all B.) Help C.) All commands D.) ?
2 5715Identify the keystroke used to terminate the setup mode? A.) Ctrl-K B.) Crtl-C C.) Ctrl-Z D.) Crtl-End
2 7746Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts
1 6368Identify the command to display the configured IP routing protocols? A.) show protocols B.) show protocols all C.) show routing-protocols D.) show ip protocols
2 5136Identify the command to configure ALL the default VTY ports? A.) Router(config)# line vty 0 4 B.) Router# line vty 0 4 C.) Router(config)# line vty D.) Router(config)# line vty 0
2 11140
What are the conversion steps of data encapsulation?
What is the point-to-point protocol in ccna?
What do you understand by ‘protocol’ in networking?
Can you explain different components in PKI?
How network gateway is different from routers?
Name the command we give if router ios stucked?
Define network congestion?
Explain what is the default behavior of access-list?
Briefly explain the conversion steps in data encapsulation.
What are the possible ways of data exchange in ccna?
Tell me how much internal and external ad of eigrp protocol?
Explain what is eigrp?
what's the difference between Symmetric and Asymmetric cryptosystem?
What are the things that can be accessed in a CISCO router’s identifying information?
Define the logical link control?