Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify the 2 commands that copies the configuration in
NVRAM to

RAM?

A.) copy backup-config running-config

B.) configure nvram

C.) copy startup-config running-config

D.) configure memory

Answers were Sorted based on User's Feedback



Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config..

Answer / guest

Answer: C D

Is This Answer Correct ?    3 Yes 0 No

Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config..

Answer / claudio tellis

c

Is This Answer Correct ?    4 Yes 1 No

Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config..

Answer / shahin

Out of two command, one i know.

a) Router# copy startup-config running-config

b) ??????????????


Cud anyone explain the nest command...!!!

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Assuming no subnetting, which two pieces of information can be derived from the IP address 144.132.25.10? (Choose two) A. It is a Class C address B. It is a Class B address C. The network address is 144.0.0.0 D. The network address is 144.132.25.0 E. The host spoon of the address is 25.10

2 Answers  


What protocols can you use while testing Trace? A.) DECnet B.) CLNS C.) IP D.) Old Vines E.) Vines F.) Chaos

1 Answers  


Identify the command that displays the SAP table? A.) show ipx servers B.) display SAP table C.) display SAP's D.) show sap table

1 Answers  


What does the Spanning Tree Algorithm (STA) do? A.) Restore lost frames B.) Builds routing tables for routing through an internetwork C.) Forward packets through a switch D.) STA is implemented by STP to prevent loops

1 Answers  


Which configuration mode and command combination sets the bandwidth metric of a Frame Relay connection? A. router(config)# clock rate 56 B. router(config)# bandwidth 56 C. router(config)# bandwidth 56000 D. router(config)# clock rate 56000

2 Answers  


How does inter- VLAN communication take place? A. It takes place through any Cisco router B. It takes place through a Cisco router that can run ISL C. It takes place through a router but this disables all the router a security and filtering functionality for the VLANS D. For nonroutable protocals (e.g. NetBeui) the router provides communications between VLAN domains E. Inter-VLAN communication is not possible because each VLAN is a separate broadcast domain

3 Answers  


take a pen and copy before solving that question there is a router name Ra there is two switch sw1 and sw2 sw1 is coneceted through fa0/1 interface of router Ra sw2 is conected through the fa1/1 serai interface of router s0/1 conected through the isp with it ip address 192.168.1.1 now therer are three host conexted through the sw1 and having ip host1=10.1.2.1 host2=10.1.2.2 host3=10.1.2.3 now there is also 3ree host conected through switch 2 i.e sw2 having ip host4=10.1.1.1 host 5=10.1.1.2 host 6=10.1.1.3 now i think u have made corect confrigation.now questios is started network admin configure the Ra router in that fassion Ra(config)#access-list 2 permit 10.1.1.0 0.0.0.255 Ra(config)#line vty 0 4 ra(config)#access-class 2 in now question is that why should network admnistratoe do it in this maneer A to give access sw1 host to acess internet B to prevent sw1 host from acessing comand promt c to prevent sw2 host from accessing console of router ra D to give sw2 host access to the enternet e prevent sw1 host from accessing internet f to prevent sw1 host from acessing the sw2 host network isp------(s0/1)..RA..(fa1/1)---SW2-host (4,5,6) | | (sw1)------host 1,2,3 this is not exect digarm but help to derive the diagram plz answer as soon as possible

6 Answers   AT&T,


Which three statements about common elements of the TCP/IP protocol stack are true? (Choose three) A. IP provides connectionless service and routing capabilities B. APP enables devices to locate the IP address of local devices C. UDP provides simple connectionless service without windowing or acknowledgments D. ICMP provides connection oriented management data to routers and Layer 3 switches E. TCP enables devices to send large quantities of data using windowing in a connection oriented manner

2 Answers  


Given an IPX network with redundant paths, what command will configure load balancing? A.) ipx load-balance B.) ip maximum-paths 2 C.) ipx maximum-paths 2 D.) ipx load-share

1 Answers  


Can you describe the Authentication Header (AH) Protocol?

0 Answers   CCIE,


What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II

1 Answers  


What are the two primary operating modes for frame switching? A. Full Duplex B. Half-Duplex C. CSMA/CD D. Cut-through E. Fragmentation F. Store and Forward G. User mode H. Privileged mode

1 Answers  


Categories