Which command, that is used to test address configuration,
uses Time-To-Live (TTL) values to generate messages from
each router.
A) telnet
B) ping
C) trace
D) bootp
Answers were Sorted based on User's Feedback
Answer / s.m.feroz ahmed
Hi,
Ping is the command which is used to test address config
and uses ttl and this ttl can be configured from router.
| Is This Answer Correct ? | 0 Yes | 0 No |
How many potions of ip?
Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config running-config B.) configure nvram C.) copy startup-config running-config D.) configure memory
What is the purpose of Split Horizon? A.) It prevents the regular update messages from reinstating a route that has gone down B.) Information received on an interface cannot be sent back out the same interface C.) Informs all neighbor routers that two routes exist D.) Tells the router the destination is unreachable
Identify the default values that make up IGRP's composite metric? A.) Bandwidth B.) Load C.) Reliability D.) MTU E.) Delay
Which addresses are INCORRECTLY paired with their class? A. 128 to 191, Class B B. 192 to 223 Class B C. 128 to 191, Class C D. 192 to 223, Class C
What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6
Which symbol in the router prompt indicates you are in the privelaged mode? A. > B. ! C. # D. :
what is the difference between dynamic NAT and NAT overload ? and how it works ?
IP extended access lists use which of the following as a basis for permitting or denying packets? A.) destination address B.) all of the above C.) protocol D.) source address E.) port
Identify the command to configure the router to boot from an alternate IOS located in flash? A.) boot system flash IOS.exe B.) boot system tftp IOS.exe 172.16.5.1 C.) boot system alternate IOS.exe D.) boot system rom IOS.exe
Why we are not using subnet mask of class A in class C?before answering this question, just think upon if we do this then we don't need to move to IPv6.
What do the following commands accomplish? access-list 1 deny 172.16.4.0 0.0.0.255 access-list 1 permit any interface ethernet 0 IP access-group 1 out A. This will block traffic from subnet 172.16.4.0 and allow all other traffic. B. This will allow traffic from subnet 172.16.4.0 and block all other traffic. C. All traffic is allowed. D. All traffic is blocked.