What does the command “IP name-server 255.255.255.255″
accomplish?
a.It disables domain name lookup.
b.It sets the domain name lookup to be a local broadcast.
c.This is an illegal command.
d.The command is now defunct and has been replaced by “IP
server-name ip any”

Answers were Sorted based on User's Feedback



What does the command “IP name-server 255.255.255.255″ accomplish? a.It disables do..

Answer / yuvraj

it sets the domain name lookup to be a local broadcast

Is This Answer Correct ?    2 Yes 0 No

What does the command “IP name-server 255.255.255.255″ accomplish? a.It disables do..

Answer / salman

b.It sets the domain name lookup to be a local broadcast.

Is This Answer Correct ?    1 Yes 0 No

What does the command “IP name-server 255.255.255.255″ accomplish? a.It disables do..

Answer / muheed

The command is now defunct and has been replaced by “IP
server-name ip any”

Is This Answer Correct ?    0 Yes 0 No

What does the command “IP name-server 255.255.255.255″ accomplish? a.It disables do..

Answer / montu

c.This is an illegal command.

Is This Answer Correct ?    0 Yes 0 No

What does the command “IP name-server 255.255.255.255″ accomplish? a.It disables do..

Answer / ajay t patel

This is an illegal command

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Which fields of an IP packet provide for fragmentation of datagrams to allow differing MTUs in the internet? A. Identification B. Flags C. Frag Offset D. Type of Service E. Total Length

1 Answers  


What is the UDP datagram format? A. Source Port - 16 bits, Destination Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data B. Destination Port - 16 bits, Source Port - 16 bits, Length - 16 Bits, Checksum - 16 bits, Data C. Source Port - 16 bits, Destination Port - 16 bits, Checksum - 16 Bits, Length - 16 bits, Data D. Source Port - 8 bits, Destination Port - 8 bits, Length -8 Bits, Checksum - 8 bits, Data

1 Answers  


Which layer defines bit synchronization? A.) Application B.) Network C.) Transport D.) Physical E.) Session F.) Session

1 Answers   Rooman,


Can you explain CHAP?

1 Answers   CCIE,


What does the following line for an access list do? 'access-list 101 deny tcp 3.4.5.0 0.0.0.255 any eq 23' A.) deny all ftp traffic B.) deny all ftp traffic from subnet 3.4.5.0 C.) deny all telnet traffic from subnet 3.4.5.0 D.) deny all ftp traffic to subnet 3.4.5.0 E.) deny all telnet traffic

1 Answers  






what the exact definition of Ethernet.plz reply as soon soon as possible

7 Answers  


What will transport layer do when data coming from session layer. They asked about intial operation(3 - way handshake)

1 Answers   HCL,


What are two ways IPX supports multiple logical networks on an individual underrate? (Choose two) A. network number B. routing protocol C. encapsulation type D. autonomous system number

1 Answers  


What are the different types of passwords that you can use in cisco routers?

0 Answers  


Which layer is responsible for framing? A.) Application B.) Data Link C.) Physical D.) Network E.) Transport

2 Answers  


A routing table contains static, RIP, and EIGRP routes for the same destination network. Which route would normally be used to forward data?

15 Answers   TCS, Wipro,


The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC

3 Answers  


Categories