What are the different types of passwords that you can use in cisco routers?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Identify 3 characteristics of switches? A.) Increase available bandwidth B.) Decrease broadcast traffic C.) Support full duplex in a multipoint topology D.) Make fowarding decision using MAC address E.) Create collision domains

1 Answers  


You are logged into a router, what command would show you the IP addresses of routers connected to you? A. show cdp neighbors detail B. show run C. show neighbors D. show cdp

2 Answers  


Given the global configuration commands: 'banner motd #' 'Hello #' When would the message be displayed? A.) The message of the day banner shows up before login. B.) The message of the day banner shows up during logoff. C.) These commands are not the right syntax for MOTD. D.) Message of the day banners are displayed upon entering global config mode. E.) Message of the day banners are not possible. F.) The message of the day would be, 'Hello #'

1 Answers  


What is the maximum request timer?

0 Answers  


IPX traffic using different encapsulation types can go over the same data link A. True B. False

1 Answers  






Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward

1 Answers  


Based upon the 1st octet rule identify the range for a Class A address? A.) 1 - 126 B.) 192 - 223 C.) 128 - 191 D.) 1 - 191

1 Answers  


What is the syntax to add a banner to the Cisco router? A.) motd banner # B.) banner C.) banner motd # D.) banner #

1 Answers   Sun Broadband,


What is the protocol and what is the purpose of the following address? 238 255 255 255 A. IPX a SAP broadcast B. IP a multicast group C. IP a reserved address D. IP a directed broadcast E. IPX a flooded broadcast

3 Answers  


What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet

3 Answers  


What field tells the Internet layer how to handle an IP packet? A. Type of Service B. Identification C. Flags D. Frag Offset

1 Answers  


Identify the OSI layer associated with bits? A.) Physical B.) Network C.) Binary D.) Data link

3 Answers  


Categories