Identify the following command to configure a secret password to
'cisco'?
A.) Router(config)#enable password cisco secret
B.) Router(config)#enable secret cisco
C.) Router(config)#enable secret password cisco
D.) Router(config)#set secret = cisco
What is the terminal emulation?
Which mode called privilege mode?
Identify the extended IP access-list number range? A.) 600 - 699 B.) 1 - 99 C.) 900 - 999 D.) 100 - 199
What is the Broadcast MAC Address?
Explain the difference between flsm and vlsm?
Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
The Physical layer works with which of the following: A.) Segments B.) Datagrams C.) Packets D.) Bits E.) Frames
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
We know that TCP provides connection oriented services, what else does it provide? A.) FECN & BECN B.) Path discovery. C.) Flow control and error checking. D.) Name resolution. E.) File manipulation.
Tell me how many fillers we can put in one ip of ipv6?
Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, the router enters in its table the number 16 to signify destination unreachable