Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


What 3 sources can configuration commands be placed into RAM?

A.) HP Openview

B.) Console

C.) Vterminal

D.) TFTP server

E.) NVRAM



What 3 sources can configuration commands be placed into RAM? A.) HP Openview B.) Console C..

Answer / guest

Answer: B D E

Is This Answer Correct ?    1 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which command should you use to confound a router so that it can become a TFTP server host for a router system image that is run in a Flash? A. copy flash tftp B. config tftp server C. write, network -router name- D. tftp-server system -file name- E. setup server tftp -system name-

1 Answers  


Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub

1 Answers  


WHY DO WE USE the command interface Vlan 1 ip adress x.x.x.x sub mask what does it do .. what does it create.. i know when we create it we can remotely telnet inti a router=switch. but what is the diff bwt vlan and intface vlan. ... vlan 1 bieng a native vlan remains there eve if i dont gv switch an ip address .. lease suggest.

1 Answers   Wipro,


Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack

2 Answers  


Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address

1 Answers  


Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM

1 Answers  


What are the advantages of a layered model in the networking industry?

0 Answers  


You are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem? A. NetWare 4.11 defaults to 802.2 encapsulation. B. NetWare 4.11 defaults to 802.3 encapsulation C. Cisco routers only work with NetWare 3.11. D. NetWare 3.11 defaults to 802.2 encapsulation.

1 Answers  


What is the usage of service password encryption?

0 Answers  


Identify the default encapsulation on serial interfaces? A.) ISDN B.) HDLC C.) SDLC D.) Frame Relay E.) PPP

2 Answers  


Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM

1 Answers  


8. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges in your network C. When you install routers in your network D. When you use Switches configured with multiple VLANS

5 Answers  


Categories