Given the global configuration commands:
'banner motd #'
'Hello #'
When would the message be displayed?
A.) The message of the day banner shows up before login.
B.) The message of the day banner shows up during logoff.
C.) These commands are not the right syntax for MOTD.
D.) Message of the day banners are displayed upon entering
global config
mode.
E.) Message of the day banners are not possible.
F.) The message of the day would be, 'Hello #'
Answer / guest
Answer: A
Message of the day banners are displayed when a user logs on
to the
router. In the example above, the '#' is the unique delimiting
(terminating) character. In this way, banners can have
multiple lines,
terminated not by hitting , but rather by the chosen
(unique) delimiting
character.
Is This Answer Correct ? | 0 Yes | 1 No |
How we ping ICMP a NIC with a correct IP address but with wrong MAC address Do all NIC's can run inpromiscuous mode
How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain
When ip confliction accord in subnet which ip assigned automatically and what it called?
Write out a config to permit only the below MAC address to pass traffic through a port on your switch. mac-address 0005.1b00.5b58
Which port are used by Viruses? TCP or UDP?
What is the virtual path?
Identify the hardware component that stores the bootstrap program? A.) ROM B.) NVRAM C.) Booter load D.) RAM E.) Flash
what is router,bridges,hubs?
You can access three forms of WAN services with Cisco routers. Select the three forms: A. Switched or relayed services B. Interface front end to IBM enterprise data center computers C. Using protocols that connect peer-to-peer devices like HDLC or PPP encapsulation. D. IPX/SPX E. NetBEUI
Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM
Which layer manages protocol access to the Network layer? A.) Datalink - MAC Sublayer B.) Datalink - LLC Sublayer C.) Transport D.) Session E.) Network
Identify the 3 characteristics of IPX RIP? A.) Distance vector B.) Does not support multiple paths C.) 60 second updates D.) Default encapsulation is SAP E.) Uses ticks and hop count as a metric