Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify the command that forces the router to load into ROM
mode

upon a reload?

A.) boot system rom

B.) rom boot

C.) boot system flash rom

D.) boot router rom



Identify the command that forces the router to load into ROM mode upon a reload? A.) boot sys..

Answer / guest

Answer: A

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which type of switching reads in the entire frame before forwarding it? A.) Tabling B.) Store-and-Forward C.) Inverse ARP D.) Fast Forward E.) Cut-Through F.) Routing

1 Answers  


Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub

1 Answers  


What is the function of Layer 2 Device?

3 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


What is the IEEE specification for Spanning Tree Protocol? A.) 802.9 B.) 803.ud C.) 803 D.) 802.1d

1 Answers  


What is difference between Store-and-Forward, cut-through, Fragment-Free Method?

2 Answers   HCL, Microsoft,


What is the difference between the switch, hub, and router?

0 Answers  


What is Cisco register bits? How they help?

1 Answers   jetking,


Identify 2 characteristics of PPP? A.) Uses LLC to establish the link B.) Default serial encapsulation C.) Support multiple layer 3 protocols D.) Offers two types of authentication; PAP and CHAP

3 Answers  


How does a web page works though each layers ?

5 Answers   HCL, PBPL,


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

1 Answers  


Which OSI layer handles physical addresses and network topology? A.) Presentation B.) Physical C.) Transport D.) Application E.) Data-Link F.) Network

2 Answers  


Categories