Identify the 2 commands to copy a configuration from a TFTP
server
to RAM?
A.) configure network
B.) configure overwrite
C.) copy backup-config running-config
D.) copy tftp running-config
Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191 D.) 1 - 191
Extended IP access-lists (100-199) can be used to control traffic. Which command listed below will permit smtp mail to only host 3.4.5.6 ? A.) It is not possible for SMTP traffic B.) access-list 102 permit tcp any host 3.4.5.6 eq smtp C.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 23 D.) access-list 102 permit tcp any any eq smtp E.) access-list 101 permit tcp any 3.4.5.6 0.0.0.0 eq 25
Identify IPX GNS and it's purpose? A.) Go Network Server - sends a print job to a network server B.) Get Nearest Server - locate the nearest server C.) Guaranteed Network Services - allocates resources to users D.) Get Notes Server - locates Domino Server
Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) DDP E.) Ethernet
Identify the IPX standard access-list number range? A.) 600 - 699 B.) 1000 - 1099 C.) 1 - 99 D.) 100 - 199 E.) 800 - 899
What are the types of communication in ipv6 ?
Which of the following will show an extended access list 150? A.) sh access-list 150 B.) sh ip int C.) sh ip access-list D.) sh access-list 150 extended
Which command we give on privilege mode for coming back to user execution mode?
What is Route Poisoning?
Identify the X.25 addressing standard? A.) X.121 B.) X.25a C.) ITU-1 D.) Q933a
what are the different symmetric algorithms?
What are the 3 ways routers learn paths to destination networks? A.) Dynamic B.) Static C.) Routing tables D.) Default