What is the command to copy the IOS image to a TFTP server?
A.) copy flash tftp
B.) copy running-config tftp
C.) copy ios tftp
D.) copy startup-config tftp
Answers were Sorted based on User's Feedback
Identify the type of routing protocol that maintains a topological database of the network? A.) Topological state B.) Shortest Path First C.) Link state D.) Distance vector
Can you explain IKE (Internet Key Exchange)?
The PDU at the network layer is a ________ Packet Frame Segment Bit
When a Distance Vector routing protocol detects that a connected network has gone down, it sends out a special routing update packet, telling all directly connected routers that the distance to the dead network is infinity. This is an example of which routing technology? A.) ICMP. B.) Only Link State routing protocols have this intelligence. C.) Triggered updates. D.) Garrison-4. E.) Split Horizon. F.) Poison Reverse.
why we have to implement access list in router ??????what is the benifit and how it is configure
Identify the command that configures serial0 for PPP encapsulation? A.) Router(config)# encapsulation ppp B.) Router(config-if)# encapsulation serial ppp C.) Router(config-if)# encapsulation ppp D.) Router# encapsulation ppp
Station A is transmitting data to station B faster that station B can handle it. When station B's buffer fills up, it send out a message to station A to stop sending data. After B empties out its buffer, station B sends a message to station A to start sending data again. This is most directly an example of (pick the best answer only): A.) Poison Reverse B.) Connectionless protocol C.) Windowing D.) Connection oriented protocol E.) Flow Control F.) Split Horizon
Which ISDN protocol prefix specifies switching and signalling? A.) I B.) E C.) Q D.) S
What will be the prefix length of 224 in vlsm?
What does CCNA stand for? A. Cisco Certified Network Administrator B. Cisco Certified Network Associate C. Certified Circuitry in Networking Apprentice D. Calico Cats of North America
Define autonomous system (as)?
Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) They are identical C.) They both require the enable password D.) User exec is a subset of the privileged exec