Identify the command to configure the router for IGRP autonomous
system 100?
A.) Router(config)# router igrp 100
B.) Router> router igrp 100
C.) Router# router igrp 100
D.) Router(config)# router igrp
Answers were Sorted based on User's Feedback
Answer / haja bahurudeen m
Answer : A
Autonomous system configured in configure mode.
| Is This Answer Correct ? | 4 Yes | 0 No |
Answer / usamacvr
Answer A.) Router(config)# router igrp 100
B.) Router> router igrp 100 = configuration cannot be
viewed or altered from user mode
C.) Router# router igrp 100 = configuration cannot be altered
D.) Router(config)# router igrp = need autonomous number
| Is This Answer Correct ? | 0 Yes | 0 No |
Which protocol gets a hardware address from a known IP address? A.) RARP B.) TCP C.) IP D.) BootP E.) ARP F.) ICMP
In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?
4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN
Which two solutions are used to reduce the chance of distance vector routing loops? (choose two) A. split horizon B. route poison C. area hierarchies D. link state algorithms
Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) Token Ring E.) IP
Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts
In regards to the OSI seven-layer model, at which layer is EBCDIC and ASCII? A.) Presentation B.) Application C.) Transport D.) Session E.) Datalink F.) Network
what is 5-4-3 rule?
What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.
Which three protocols are corerectly matched to their transport layer functions? (Choose three) A. route selection IP B. sliding window UDP C. well known pods IP D. route validation ICMP E. connection oriented TCP F. three way handshake TCP G. no sequence and acknowledgement UDP
Which of the following use PVCs at layer 2? A.) X.25 B.) HDLC C.) Frame relay D.) ISDN
What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.