Identify the mode reflected by the following prompt 'Router'?

A.) Setup

B.) RXBoot

C.) Boot mode

D.) Privileged exec mode

Answers were Sorted based on User's Feedback



Identify the mode reflected by the following prompt 'Router'? A.) Setup B.) RXBoot ..

Answer / guest

Answer: B

Is This Answer Correct ?    2 Yes 1 No

Identify the mode reflected by the following prompt 'Router'? A.) Setup B.) RXBoot ..

Answer / umesh

rxboot

Is This Answer Correct ?    0 Yes 1 No

Post New Answer

More CCNA Interview Questions

Which EXEC command displays system hardwarde configuration information software version and the names and sources of configuration files and boot images on a router? A. show boot B. show flash C. show config D. show version

1 Answers  


Which layer is responsible for negotiating data transfer syntax? A.) Network B.) Session C.) Application D.) Transport E.) Presentation

2 Answers  


WAN stands for which of the following? A.) Wide Arena Network B.) World Area Network C.) Wide Area News D.) Wide Area Network

2 Answers  


What is Cisco's default encapsulation method on serial interfaces? A.) ANSI B.) Cisco C.) Q933a D.) HDLC

2 Answers  


Which statement is true regarding full duplex? A.) Allows for transmission and receiving of data simultaneously B.) Only works in a multipoint configuration C.) Does not affect the bandwidth D.) Allows for transmission and receiving of data but not at the same time

2 Answers  






An optional parameter on an IPX access is the 'LOG' parameter. This records access-list violations when a packet matches. What else does the 'LOG' option do? A.) Records the number of times that a packet matches the list. B.) Return a message to user who is denied access the by list. C.) Notifies an SNMP Agent. D.) Saves the log to NVRAM. E.) Send an SNMP Trap.

1 Answers  


Which three are typical operational phases in a basic connection oriented neloyord service? (Choose three) A. call setup B. data transfer C. load balancing D. call termination E. call priortization F. data segmentation G. data link identification

1 Answers  


What is the terminal emulation?

0 Answers  


What are characteristics of UDP A. It is reliable and acknowledged B. It is unreliable and acknowledged C. It is reliable and unacknowledged D. It is unreliable and unacknowledged

2 Answers  


Identify the 2 rules used when configuring a Distance Vector routing protocol? A.) Physically connected network(s) B.) Configure the classful address, no subnets C.) Enable CDP so neighbors can be detected D.) Configure all networks in Area0

1 Answers  


What is 10base5 ethernet lans?

0 Answers  


How is private ip different from public ip?

0 Answers  


Categories