Identify the following command to configure a secret password to

'cisco'?

A.) Router(config)#enable password cisco secret

B.) Router(config)#enable secret cisco

C.) Router(config)#enable secret password cisco

D.) Router(config)#set secret = cisco



Identify the following command to configure a secret password to 'cisco'? A.) Router..

Answer / guest

Answer: B

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify the command that disables name-to-address translation? A.) Router(config-dns)# no ip domain-lookup B.) Router(config)# no address translation C.) Router(config)# no ip domain-lookup D.) Router(config)# ip domain-lookup

1 Answers  


Identify the command mode necessary to enter the extended ping command? A.) Router# B.) Router> C.) Router(config)# D.) Router(ext-ping)#

3 Answers  


What is the protocol number for UDP? A.) 6 B.) 17 C.) 25 D.) 21

1 Answers  


Which command listed below sets the banner message when someone connects to the router? A.) message # B.) banner # C.) login banner # D.) description # E.) login description # F.) banner motd #

2 Answers  


Identify the correct IGRP configuration? A.) Router# router igrp 100 Router# network 10.0.0.0 B.) Router(config)#router igrp 100 Router(config-router)#network 10.0.0.0 C.) Router(config)# router igrp Router(config-router)# network 10.0.0.0

3 Answers  






What are hold-downs used for? A.) To prevent regular update messages from reinstating a route that has come back up B.) Information received on an interface cannot be sent back out the same interface C.) To prevent regular update messages from reinstating a route that has gone down D.) To hold the routing table from being sent to another router

1 Answers  


Which range of possible numbers do standard ipx access lists have? A. 100 199 B. 600 699 C. 800 899 D. 1000-1099

1 Answers  


Station A is transmitting data to station B, and expects an acknowledgment after every 400 bytes. After transmitting data for a while, the two stations determine the line is reliable and change to expecting and acknowledgement every 600 bytes. This is an example of (pick the best answer only): A.) BECN B.) Sliding Windows C.) Poison Reverse D.) Countdown timers E.) Split Horizon F.) Count to infinity

1 Answers  


Why subnetting is used?

0 Answers  


What is the difference between arp and rarp?

0 Answers  


Tell me which protocol comes under hybrid dynamic type?

0 Answers  


Identify the number range for IPX SAP filters? A.) 900 - 999 B.) 1000 - 1099 C.) 800 -899 D.) 100 - 199

1 Answers  


Categories