Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify the prompt displayed if in privileged exec mode?

A.) Router(config)#

B.) Router#

C.) Router>

D.) Router(priv)#

Answers were Sorted based on User's Feedback



Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C..

Answer / guest

Answer: B

Is This Answer Correct ?    4 Yes 0 No

Identify the prompt displayed if in privileged exec mode? A.) Router(config)# B.) Router# C..

Answer / suraj kumar gupta

A.) Router(config)# This is global configuration mode whre
we can make changes in the network.

B.) Router#This is privilege mode whre we can use the
commands for troubleshoting our network.

C.) Router>user mode only few basic commands we can use here.

D.) Router(priv)#this is not exist in the router. May be new
search...ha..ha

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub

1 Answers  


what is the main features of link state routing protocols?

1 Answers   Wipro,


what is the difference between osi and tcp ?

8 Answers   Wipro,


Identify the keystroke used to terminate the setup mode? A.) Ctrl-K B.) Crtl-C C.) Ctrl-Z D.) Crtl-End

2 Answers  


Explain the types of communication in ipv6 ?

0 Answers  


Which OSI layer supports the communication component of an application? A.) Data-Link B.) Physical C.) Session D.) Presentation E.) Application F.) Transport

2 Answers  


In how many ways you can access the router?

0 Answers  


What is the advantage of vlan?

0 Answers  


What is the last step in data encapsulation? A.) User information is converted into data. B.) Segments are converted into datagrams and packets. C.) Frames are put into bits. D.) Data is converted into segments. E.) Packets are put into logical frame.

2 Answers  


Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI

1 Answers  


Explain how an spf algorithm works?

0 Answers  


When you cords an IP address on a place router which command stale the IP processing on the interface? A. ip enable B. network ip-address C. ip address ip-address subnet mask D. the exit command from the enabled configuration E. copy running-configuration to startup-configuration

3 Answers  


Categories