Which command do you use to set the Privileged mode password to
'clearwater'?
A.) set password=clearwater
B.) enable privilege password clearwater
C.) enable password clearwater
D.) enable login clearwater
E.) enable secret password clearwater
F.) ebable clearwater
Answers were Sorted based on User's Feedback
Identify the purpose of the Trace command? A.) Explorer packet transmitting routing information B.) Test connectivity C.) Determine the path a packet is taking through the network D.) Transmits user data when buffers are full
Which layer of the 7 layer model provides services to the Application layer over the Session layer connection? A.) Transport B.) Application C.) Session D.) Network E.) Datalink F.) Presentation
On an ISDN BRI interface, the control channel is the 'D' channel. What is the rate of this channel? A.) 64 Kbps B.) 1.544 Mbps C.) 128 Kbps D.) 2.048 Mbps E.) 16 Kbps
how can we block remote desktop for some user from cisco router through aaccess-list
Which of the following is used to manage and monitor the network? A.) SNMP B.) HTTP C.) IP D.) FTP
Which port are used by Viruses? TCP or UDP?
What does a router change in a packet when it forwards a packet to the next hop? * A: Destination physical address * B: Destination network address * C: Destination network address and the destination physical address
Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity
What are 3 ways to provide login access to router? A.) Console B.) TFTP C.) Rlogin D.) Auxiliary Port E.) X Windows F.) Telnet
Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
What are the 2 functions of the Data Link Mac layer? A.) Handles access to shared media B.) Manages protocol access to the physical network medium C.) Provides SAPs for higher level protocols D.) Allows multiple devices to uniquely identify one another on the data link layer