What 3 sources can configuration commands be placed into RAM?
A.) HP Openview
B.) Console
C.) Vterminal
D.) TFTP server
E.) NVRAM
Which command should you use to confound a router so that it can become a TFTP server host for a router system image that is run in a Flash? A. copy flash tftp B. config tftp server C. write, network -router name- D. tftp-server system -file name- E. setup server tftp -system name-
Identify the type of hardware required to connect a Token ring network to an Ethernet network? A.) Repeater B.) TR-Enet C.) Router D.) Token Ring to Ethernet translation hub
WHY DO WE USE the command interface Vlan 1 ip adress x.x.x.x sub mask what does it do .. what does it create.. i know when we create it we can remotely telnet inti a router=switch. but what is the diff bwt vlan and intface vlan. ... vlan 1 bieng a native vlan remains there eve if i dont gv switch an ip address .. lease suggest.
Identify the purpose of the Ping command? A.) Share routing information with a neighbor router B.) Transmit user data when buffers are full C.) Test connectivity at layer 3 D.) Test entire protocol stack
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
Where is the backup configuration file stored? A.) RAM B.) ROM C.) Console D.) NVRAM
What are the advantages of a layered model in the networking industry?
You are a system administrator on a NetWare network, you are running NetWare 4.11 and you cannot communicate with your router. What is the likely problem? A. NetWare 4.11 defaults to 802.2 encapsulation. B. NetWare 4.11 defaults to 802.3 encapsulation C. Cisco routers only work with NetWare 3.11. D. NetWare 3.11 defaults to 802.2 encapsulation.
What is the usage of service password encryption?
Identify the default encapsulation on serial interfaces? A.) ISDN B.) HDLC C.) SDLC D.) Frame Relay E.) PPP
Identify the hardware component that stores the backup configuration? A.) RAM B.) NVRAM C.) Flash D.) ROM
8. When is Frame Tagging used? A. When you install repeaters in your network B. When you install bridges in your network C. When you install routers in your network D. When you use Switches configured with multiple VLANS