Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


Explain how many ways to access router?


No Answer is Posted For this Question
Be the First to Post Answer

Post New Answer

More CCNA Interview Questions

Which command will copy the routers configuration from NVRAM to a Network file server? A.) copy start tftp B.) copy start tftp server C.) copy tftp startup-config D.) copy running-config tftp E.) copy startup-config tftp

1 Answers  


Which technology is used by Catalyst switches to resolve topology loops and ensure data flows properly through a single network path? A. virtual LANS (VLANS) B. frame filtering C. cut-through switching D. spanning-tree protocol

2 Answers  


Identify the command that saves the configuration stored in RAM to NVRAM? A.) copy running-config startup-config B.) copy tftp running-config C.) copy startup running D.) copy active to backup

2 Answers  


what is the difference between switch and router??

16 Answers   Infosys, Precision Techserve, Thomson,


Identify 2 functions of IPX access-lists? A.) Control SAP traffic B.) Limit number of Novell servers on a network C.) Limit number of workstations on a network D.) Block IPX traffic

1 Answers  


Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default

1 Answers  


Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A) telnet B) ping C) trace D) bootp

4 Answers  


Hi all, Sorry, but i want to say that right now i have around two years experience and doing the job as a network engineer(ccna certified).but i want switch job so please can tell me any opportunity.

1 Answers   Wipro,


Given the Novell IPX address 1aceb0b.0000.0c12.3456 which part is the network portion of the address? A.) 0000 B.) 1 C.) 3456 D.) 1ace E.) 0000.0c12.3456 F.) 1aceb0b

2 Answers  


Who controls mac address uniqueness and how?

0 Answers  


Which of the following are examples of the Session Layer? A.) TCP B.) LLC C.) SQL D.) NFS E.) Token Ring

1 Answers  


Which of the following are valid Cisco encapsulation type names? A.) arpa = IPX Ethernet B.) novell-ether = IPX Ethernet_802.3 C.) snap = IEEE 802.2 SNAP on Ethernet, FDDI, and Token Ring D.) novell-fddi = IPX Fddi_Raw E.) sap = IEEE 802.2 on Ethernet, FDDI, and Token Ring F.) hdlc = HDLC on serial interfaces

1 Answers  


Categories