Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify the following command to configure a secret password to

'cisco'?

A.) Router(config)#enable password cisco secret

B.) Router(config)#enable secret cisco

C.) Router(config)#enable secret password cisco

D.) Router(config)#set secret = cisco



Identify the following command to configure a secret password to 'cisco'? A.) Router..

Answer / guest

Answer: B

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is the terminal emulation?

0 Answers  


Which mode called privilege mode?

0 Answers  


Identify the extended IP access-list number range? A.) 600 - 699 B.) 1 - 99 C.) 900 - 999 D.) 100 - 199

2 Answers  


What is the Broadcast MAC Address?

3 Answers   Avaya, Cisco,


Explain the difference between flsm and vlsm?

0 Answers  


Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation

2 Answers  


Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address

1 Answers  


The Physical layer works with which of the following: A.) Segments B.) Datagrams C.) Packets D.) Bits E.) Frames

3 Answers   BITS,


Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john

1 Answers  


We know that TCP provides connection oriented services, what else does it provide? A.) FECN & BECN B.) Path discovery. C.) Flow control and error checking. D.) Name resolution. E.) File manipulation.

1 Answers  


Tell me how many fillers we can put in one ip of ipv6?

0 Answers  


Define Poison Reverse? A.) To prevent regular update messages from reinstating a route that has gone down B.) Packets sent out that are not destined for a network go to the default network C.) Information received on an interface cannot be sent back out the same interface D.) When a network goes down, the router enters in its table the number 16 to signify destination unreachable

1 Answers   Google,


Categories