Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Cisco routers can secure the enable password with a one-way hash

algorithm. What command would encrypt the enable password
with the

strong encryption method?

A.) enable encrypt john

B.) password john

C.) enable secret john

D.) enable password john

E.) secret john

F.) enable password 5 john



Cisco routers can secure the enable password with a one-way hash algorithm. What command would en..

Answer / guest

Answer: C

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which layer manages protocol access to the Network layer? A.) Datalink - MAC Sublayer B.) Datalink - LLC Sublayer C.) Transport D.) Session E.) Network

3 Answers  


What is subnet? Why is it used?

0 Answers  


IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port

1 Answers  


IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port

3 Answers  


Which ISDN protocol prefix specifies switching and signalling? A.) I B.) E C.) Q D.) S

1 Answers  


Can anyone explain the STP Security features. Just like BPDU guard, Root Guard. Hi JITENDERA, i m specially looking for u?????

2 Answers  


As the system administrator, you type "ppp authentication chap pap secret". Which authentication method is used first in setting up a session? A. secret B. PAP C. CHAP D. PPP/SLIP

1 Answers  


In IOS boot sequence if the flash is erased, and there is no access to TFTP server, and we can't load the partial IOS from ROM. Is there any possiblity that we can still boot the router/switch from external PC in which the IOS is installed?

6 Answers  


Identify the purpose of the following command 'ip route 192.168.100.0 255.255.255.0 10.1.0.1' A.) Enabling a dynamic routing protocol B.) Creating a static route to the 10.1.0.0 network C.) Teaches the router about the distant network 192.168.100.0 and how it can be reached via 10.1.0.1 D.) Assigning the IP address 192.168.100.0 to an interface

1 Answers  


hello friends im murtaza frm indore... and my question is that im doing hardware engenering and networking and im intrested in make a good career in networking so can you suggest.. which institiue is good for me...plzzz replyy im waiting...

1 Answers  


Which of the following can reply to a Novell Get Nearest Server (GNS) request? A.) Local Novell server B.) Remote Novell Printer C.) Cisco router D.) Novell client

1 Answers  


Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? A. Identification B. Flags C. Frag Offset D. Type of Service E. Total Length

1 Answers  


Categories