Identify the command to configure the configuration-register?

A.) Router# config-register 0x2102

B.) Router(config)# config-register 0x2102

C.) Router(config-reg)# 0x2102

D.) Router> config-register 0x2102



Identify the command to configure the configuration-register? A.) Router# config-register 0x2102 ..

Answer / guest

Answer: B?

Is This Answer Correct ?    6 Yes 0 No

Post New Answer

More CCNA Interview Questions

Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


Can anybody tell me how to configure a cisco router?

2 Answers  


Identify the command mode necessary to enter the extended ping command? A.) Router# B.) Router> C.) Router(config)# D.) Router(ext-ping)#

1 Answers  


How network gateway is different from routers?

0 Answers  


In stp which protocol is used for detrming root port root bridge ,forwarding port and blocking port

1 Answers   IBM,


Identify the command to reload the router? A.) Router(config)# reload B.) Router# reset C.) Router# reload D.) Router> reload

1 Answers  


What is the Difference between Hub and Switch?

2 Answers  


what is farme realy.and on which layer it work

3 Answers  


What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging

1 Answers  


How does the cut-through switching technique work? A.) By using broadcast address as source addresses B.) The switch waits only for the header to be received before it checks the destination address and starts forwarding the packets C.) The LAN switch copies the entire frame into its onboard buffers and then looks up the destination address in its forwarding, or switching, table and determines the outgoing interface D.) By using a Class I repeater in a collision domain

1 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


Which two of the following are valid ways to have multiple encapsulation types on a single interface? A.) This is not possible B.) subinterfaces C.) additional physical interfaces D.) secondary addresses

2 Answers  


Categories