Which command we give on privilege mode for coming back to user execution mode?
No Answer is Posted For this Question
Be the First to Post Answer
For IPX, what is the DEFAULT Cisco Encapsulation on an Ethernet interface? A.) novell-ether B.) gns C.) snap D.) arpa E.) sap F.) dix
hi friends i have a problem.plz solve this. i am working some where and i have the number of swtitch.once my project manger says that we are going to exapnd our number of employ so plz attech an another switch.i asked to my jr network engineer that take a witch and implemnt on that n/w,as he implement the switch on that n/w.thats network get down, plz tell me what is the reason of that.
What is the juncture at which the CPE ends and the local loop portion of the service begins? A. Demarc B. CO C. Local loop D. Last-mile
Identify the 3 key features of the Cisco Discovery Protocol? A.) Off by default B.) Will allow for the discovery of layer 3 addresses on neighbor routers C.) Verify connectivity D.) Open standard E.) Does not require any layer 3 protocols to be configured
Identify 2 transport layer protocols? A.) IP B.) TCP C.) CDP D.) ARP E.) UDP
Identify 3 features of IGRP? A.) Composite metric B.) New horizon C.) Flash updates D.) 60 periodic updates E.) Poison reverse
Given the configuration example: interface ethernet0 ipx network 4a ipx access-group 800 out interface ethernet1 ipx network 3d interface ethernet2 ipx network tc access-list 800 permit 3d 4a Which action result from implementing this configuration? a-Traffic from network 3d for network 4a will be forwarded out e0 b-IPX network 5c will not receive any traffic c-Traffic from network 3d, destined for network 4a, will be forwarded out e2 d-Traffic from network 3d for network 3d will be forwarded out e0
1 what is private vlam 2 if there is a router which have two fast Ethernet from from fa0/0 192.168.10.0/24 network is connected from fa0/1 192.168.20.0/24 network is connected all bacsic routing is done will they communicate 3 what is difference between snmp v1 v2 and v3 what difference between name and stranded access list
Of the following, which reason applies to dividing a large network into two or more smaller networks? Performance Security Address Management All of the above
Can you explain IKE (Internet Key Exchange)?
What is the usage of service password encryption?
what is stp.