Identify 3 ways in which a router can be configured?
A.) TFTP
B.) Nvram
C.) Ping
D.) Console
E.) Trace
Answers were Sorted based on User's Feedback
Answer / guest
Answer: A B D
Changes to the configuration can be entered via the console,
a config
stored in NVRAM or on a TFTP server. Trace and ping are
tools to verify
connectivity.
| Is This Answer Correct ? | 5 Yes | 0 No |
Answer / nawaz
Answer- A B D
router can be configured throug tftp
nvram ,console
| Is This Answer Correct ? | 1 Yes | 0 No |
Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) DDP E.) Ethernet
What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.
What is Standard ACLs?
What is the command to copy the IOS image to a TFTP server? A.) copy flash tftp B.) copy running-config tftp C.) copy ios tftp D.) copy startup-config tftp
Given an IP host address of 172.16.2.160 and a shored mask of 255.255.255.192 to which shored does the host belong? A. 172.16.2.32 B. 172.16.2.64 C. 172.16.2.96 D. 172.16.2.128 E. 172.16.2.192
Explain which layer are called upper layer?
How many voltage that passes through the ISDN?
4 Answers CTS, Swirl Infosystems,
What are 10baset ethernet lans?
The Datalink layer works with which of the following: A.) Packets B.) Bits C.) Globules D.) Frames E.) Segments
You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet
What is a back off on an 802.3 networks? A. It is latency in store and forward switching B. It is the time used for token passing from machine to machine C. It is the retransmission delay that is enforced when a collision occurs D. It is the result of two nodes transmitting at the same time. The frames from each transmitting device collide and are damaged
how to troubleshoot when protocols is down and link is not getting up