What are the different types of the password used in securing a cisco router?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Dear Mr.Shahin thank you very much for your advise i realy thanks full to you. Best of luck

2 Answers  


How do you go to privileged mode? How do you switch back to user mode?

0 Answers  


Which statement about the Point to Point Protocol (PPP) is true? A. PPP supports TCP/IP but not Novell IPX B. PPP is being phased out of existence by the Serial Line Internet Protocol (SLIP) C. PPP providces router to router and host to network connections over both synchronous and asynchronous circuits D. PPP is an ITU T and ANSI standard that defines the process for sending data over a packet switched data network (PSDN)

2 Answers  


The Cisco IOS is stored in: A.) ROM B.) CD C.) Flash D.) NVRAM

5 Answers  


Which of the following protocols are used to get an IP address from a known MAC address? A.) BootP B.) TCP C.) IP D.) ARP E.) RARP F.) ICMP

1 Answers   CMC,






You have just issued the erase startup-config Command and reloaded your router. In which mode will your router be when you react? A. setup B. startup C. user EXEC D. userd privileged E. global configuration

3 Answers  


Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config running-config B.) configure nvram C.) copy startup-config running-config D.) configure memory

3 Answers  


Urgent reply plz donot have time to serch on google plz reply the questions is how to remove newfolder.exe virus from my windows 2003 server i have all ready tried quick heal.spy hunter mcafee server . plz reply

1 Answers  


When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.

1 Answers  


What do you use the Aux port for? A.) Console B.) Terminal editing C.) Modem D.) Backup logging

3 Answers  


Explain the terms unicast, multicast, broadcast and multicast.

0 Answers  


wat is last assignable host address in 209.165.201.0/27 network?

7 Answers  


Categories