Which three commands are used to configure information into
RAM on a router? (Choose three)
A. configure memory
B. configure terminal
C. configure overwrite
D. copy tftp startup-config
E. copy running-config startup-config
F. copy startup-config running-config
Answers were Sorted based on User's Feedback
Answer / rohit dodia
B. configure terminal
E. copy running-config startup-config
F. copy startup-config running-config
Is This Answer Correct ? | 5 Yes | 2 No |
Answer / rohit dodia
B. configure terminal
E. copy running-config startup-config
F. copy startup-config running-config
Is This Answer Correct ? | 1 Yes | 2 No |
Answer / s.m.feroz ahmed
Hi,
D E F are the 3 right answers wherein a brief description
of how to overwrite it to NVRAM.First we should copy
startup configuration to TFTP and copy running config to
startup config to TFTP and viceversa then copy startup and
running config to NVRAM on Router.
Is This Answer Correct ? | 0 Yes | 1 No |
What are the things that can be accessed in a CISCO router’s identifying information?
Differentiate User Mode from Privileged Mode?
Inverse ARP serves what purpose? A.) Method for a local router to introduce itself to the remote end of the connection B.) Broadcast a routing table update C.) Identify MAC addresses if the IP address is known D.) Sent every 10 seconds used to verify the Frame Switch is still active
What are the two most common transport layer protocols? UDP TCP IPX ARP
Which can be true regarding VLANs? A.) They are created by location B.) They are created by function C.) They are created by department D.) They are created by group
How do you disable CDP on the entire Router? A.) Router#no cdp run B.) Router(config-if)# no cdp enable C.) Router(config)# no cdp enable D.) Router(config)# no cdp run
You need to come up with a TCP/IP addressing scheme for your company. Which two factors must you consider when you define the subnet mask for the network? A.) The location of DHCP servers B.) The volume of traffic on each subnet C.) The number of subnets on the network D.) The location of the default gateway E.) The number of host IDs on each subnet
Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply
What is the draw back of ospf protocol?
what the exact definition of Ethernet.plz reply as soon soon as possible
Identify the length of an IPX address and it's components? A.) 80 bits, 48 bits network and 32 bits node B.) 32 bits, 16 bits network and 16 bits node C.) None of the above D.) 80 bits, 32 bits network and 48 bits node
What do you understand by poe (power over ethernet)?