Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Identify the command to copy a configuration file from a TFTP

server to a routers active configuration?

A.) Router# copy running-config tftp

B.) Router# copy tftp running-config

C.) Router# copy tftp 172.16.0.1 running-config

D.) Router(config)# copy tftp running-config



Identify the command to copy a configuration file from a TFTP server to a routers active configur..

Answer / guest

Answer: B

Is This Answer Correct ?    4 Yes 1 No

Post New Answer

More CCNA Interview Questions

Explain the difference between simple authentication and md5?

0 Answers  


Assume that you are editing a line of text on a Cisco router. What key-stroke combination would take you to the beginning of the line? A.) CTRL-B B.) CTRL-Z C.) CTRL- D.) CTRL-A E.) CTRL- F.) CTRL-

2 Answers  


What is the purpose of Split Horizon? A.) It prevents the regular update messages from reinstating a route that has gone down B.) Information received on an interface cannot be sent back out the same interface C.) Informs all neighbor routers that two routes exist D.) Tells the router the destination is unreachable

1 Answers  


What are the different types of password used in securing a cisco router?

0 Answers  


Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connnection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding

1 Answers  


Identify the command to display the configured IP routing protocols? A.) show protocols B.) show protocols all C.) show routing-protocols D.) show ip protocols

2 Answers  


Identify the command mode necessary to enter the extended ping command? A.) Router# B.) Router> C.) Router(config)# D.) Router(ext-ping)#

1 Answers  


What type of frame does CDP use to gather information about it's neighbors? A.) TCP/IP B.) Novell-ether C.) Subnetwork Access Protocol (SNAP) D.) Ethernet_II

1 Answers  


There are 2 types of PPP authentication supported by the Cisco IOS. What are they? A.) PAP B.) PREDICTOR C.) MD5 D.) CHAP E.) STACKER F.) MSCHAP

4 Answers  


Identify the command to configure the router to boot from an IOS located on a TFTP server? A.) boot system tftp IOS.exe 172.16.5.1 B.) boot system tftp 172.16.5.1 IOS.exe C.) boot system flash tftp 172.16.5.1 D.) boot system IOS.exe 172.16.5.1

1 Answers  


Which of these is the Private key? A. Bear B. Cave C. Indian D. Cowboy

1 Answers  


Which two steps are required to confound and apply standard access lists on an interface? (Choose two) A. define an access list number and its parameters B. enable an interface to become part of the access list group C. define the number of access lists to be supported on an interface D. copy the access list definition to each interface that will support it

2 Answers  


Categories