Which three commands are used to configure information into
RAM on a router? (Choose three)
A. configure memory
B. configure terminal
C. configure overwrite
D. copy tftp startup-config
E. copy running-config startup-config
F. copy startup-config running-config
Answers were Sorted based on User's Feedback
Answer / rohit dodia
B. configure terminal
E. copy running-config startup-config
F. copy startup-config running-config
| Is This Answer Correct ? | 5 Yes | 2 No |
Answer / rohit dodia
B. configure terminal
E. copy running-config startup-config
F. copy startup-config running-config
| Is This Answer Correct ? | 1 Yes | 2 No |
Answer / s.m.feroz ahmed
Hi,
D E F are the 3 right answers wherein a brief description
of how to overwrite it to NVRAM.First we should copy
startup configuration to TFTP and copy running config to
startup config to TFTP and viceversa then copy startup and
running config to NVRAM on Router.
| Is This Answer Correct ? | 0 Yes | 1 No |
With one method for transmitting frames through a switch, the switch receives the complete frame and checks the frame CRC before forwarding the frame. What is the switch transmission method called? A. CSMA/CD B. Full Duplex C. Cut-Through D. Half-Duplex E. Fragmentation F. Store and Forward
1 whatis te1,te2 and nt1 what is threre functions 2 what are the isdn protocols 3 whait is spid
Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic
Hi Gyes, here is new question. can you provide answer of following question Like linux, can we windows as router? If yes how can we able to do this,
Sequence and acknowledgement numbers are used for? A.) Layer transitioning B.) Flow control C.) Port number addressing D.) Reliability
When the router runs out of buffer space, this is called ________. A. Source Quench B. Redirect C. Information Request D. Low Memory
Can you describe the Authentication Header (AH) Protocol?
6. Which device can create smaller networks and stop broadcast storms by default? A. Repeater B. Bridge C. Router D. Gateway
comparative networking features windows linux
If bandwidth will increase what will happen?
Fried i am jitendera here.i donot know this is ccna question or not but i need some help friend i am in love and i donot know how to propose.this is my felling that she also like me but she want that i have to prosed first i am little bit shy boy how cam i propose without risk please answer this question befor any another person propose her please please please
Which protocol carries messages such as destination Unreachable, Time Exceeded, Parameter Problem, Source Quench, Redirect, Echo, Echo Reply, Timestamp, Information Request, Information Reply, Address Request, and Address Reply? A. ICMP B. UDP C. TCP D. TFTP E. FTP