Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify the command to configure the router for IGRP autonomous

system 100?

A.) Router(config)# router igrp 100

B.) Router> router igrp 100

C.) Router# router igrp 100

D.) Router(config)# router igrp

Answers were Sorted based on User's Feedback



Identify the command to configure the router for IGRP autonomous system 100? A.) Router(config..

Answer / guest

Answer: A

Is This Answer Correct ?    6 Yes 0 No

Identify the command to configure the router for IGRP autonomous system 100? A.) Router(config..

Answer / haja bahurudeen m

Answer : A

Autonomous system configured in configure mode.

Is This Answer Correct ?    4 Yes 0 No

Identify the command to configure the router for IGRP autonomous system 100? A.) Router(config..

Answer / usamacvr

Answer A.) Router(config)# router igrp 100

B.) Router> router igrp 100 = configuration cannot be
viewed or altered from user mode

C.) Router# router igrp 100 = configuration cannot be altered

D.) Router(config)# router igrp = need autonomous number

Is This Answer Correct ?    0 Yes 0 No

Identify the command to configure the router for IGRP autonomous system 100? A.) Router(config..

Answer / chandan

router(config)#router igrp 100

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which protocol gets a hardware address from a known IP address? A.) RARP B.) TCP C.) IP D.) BootP E.) ARP F.) ICMP

3 Answers  


In configuring a router, what command must be used if you want to delete the configuration data that is stored in the NVRAM?

0 Answers  


4. What is a disadvantage to using bridges in your network? A. Filters by MAC address B. Stops broadcast storms C. Doesn't stop broadcast storms D. Can only use up to 4 bridges in any LAN

3 Answers   NCTC,


Which two solutions are used to reduce the chance of distance vector routing loops? (choose two) A. split horizon B. route poison C. area hierarchies D. link state algorithms

1 Answers  


Which of the following are examples of the Datalink Layer? A.) LLC B.) SQL C.) TCP D.) Token Ring E.) IP

2 Answers  


Identify the command to display the IP host table? A.) show ip hostnames B.) show ip names C.) show hosts D.) show ip hosts

1 Answers  


In regards to the OSI seven-layer model, at which layer is EBCDIC and ASCII? A.) Presentation B.) Application C.) Transport D.) Session E.) Datalink F.) Network

1 Answers  


what is 5-4-3 rule?

2 Answers  


What does the User Datagram Protocol (UDP) provide? A.) Connectionless datagram service. B.) FECN & BECN C.) Flow control and error checking. D.) Name resolution. E.) Path discovery.

1 Answers  


Which three protocols are corerectly matched to their transport layer functions? (Choose three) A. route selection IP B. sliding window UDP C. well known pods IP D. route validation ICMP E. connection oriented TCP F. three way handshake TCP G. no sequence and acknowledgement UDP

1 Answers  


Which of the following use PVCs at layer 2? A.) X.25 B.) HDLC C.) Frame relay D.) ISDN

1 Answers  


What do the following statements in an extended access list accomplish? access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 21 access-list 101 deny TCP 172.16.4.0 0.0.0.255 172.16.3.0 0.0.0.255 eq 20 access-list 101 permit TCP 172.16.4.0 0.0.0.255 0.0.0.0 255.255.255.255 A. This will block ftp traffic. B. This will block http traffic. C. This will permit ftp traffic. D. This will permit tftp traffic.

1 Answers  


Categories