What command will not display the status of to1?
A.) show int to1
B.) show to1
C.) show interface to1
D.) show interface
what is distance vector protocol link state protocol and what is the diffrence between them
The -- terminal no editing -- command will perform what function? A.) Edit the contents of NVRAM B.) Allows access to the terminal port C.) Stops the advanced editing feature D.) Enable password functions
Which OSI layer incorporates the MAC address and the LLC? A.) Data link B.) Network C.) Physcial D.) Transport
There is an emergency fall-back 'skeleton' IOS stored in read only memory on all Cisco routers. What command would make the router load the IOS from Read Only Memory? A.) reload rom B.) boot system rom C.) load ios bootflash D.) load ios rom E.) bootsystem skeleton
You are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem? A. NetWare 4.11 defaults to 802.2 encapsulation. B. NetWare 4.11 defaults to 802.3 encapsulation C. Cisco routers only work with NetWare 3.11. D. NetWare 3.11 defaults to 802.2 encapsulation.
A router on one side of a PPP link uses the resonance RTR1 and the password COPP1-PWD. Which configuration line on RTR1 enables a connection between RTR1 and another router named RTR2? A. username, RTR2 password COPR1-PWD, B. username, RTR1 password COPR1-PWD, C. username, RTR2 password COPR2-PWD, D. username, RTR1 password COPR2-PWD,
The Physical layer works with which of the following: A.) Segments B.) Datagrams C.) Packets D.) Bits E.) Frames
Tell me which cable called roll-over?
You want to clear the outputs on your serial interface showing errors on the interface. Which command do you type?
What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.
Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols
The Network layer works with which of the following: A.) Globules B.) Bits C.) Packets D.) Segments E.) Frames