What key do you use to view the last command?

A.) Ctrl+X

B.) Ctrl+Z

C.) Ctrl+E

D.) Ctrl+P

Answers were Sorted based on User's Feedback



What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+..

Answer / guest

Answer: D

Is This Answer Correct ?    1 Yes 1 No

What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+..

Answer / venkatesh p

ctrl+z

Is This Answer Correct ?    0 Yes 0 No

Post New Answer

More CCNA Interview Questions

Identify 3 Fast Ethernet technologies? A.) 100 Base FastEther B.) 100 Base FX C.) 100 Base T4 D.) 100 Base TX

1 Answers  


What is the difference between half duplex and full duplex?

0 Answers  


1350 Value in which type of access-list?

0 Answers  


What is the maximum hop count for Link-State protocols? A.) 15 B.) there is no hop count limit C.) 256 D.) 16

2 Answers  


Which layer hides details of network dependent information from the higher layers by providing transparent data transfer? A.) Transport B.) Physical C.) Data Link D.) Session E.) Application F.) Network

1 Answers  






When using access lists, it is important where those access lists are placed. Which statement best describes access list placement? A. Put standard access lists as near the destination as possible. Put extended access lists as close to the source as possible. B. Put extended access lists as near the destination as possible. Put standard access lists as close to the source as possible. C. It isn't import where access lists are placed since the router will read and cache the whole list. D. Put access lists as close to corporate headquarters as possible.

1 Answers  


With one method for transmitting frames through a switch, the switch receives the complete frame and checks the frame CRC before forwarding the frame. What is the switch transmission method called? A. CSMA/CD B. Full Duplex C. Cut-Through D. Half-Duplex E. Fragmentation F. Store and Forward

2 Answers  


what are the different symmetric algorithms?

0 Answers   CCIE,


Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default

1 Answers  


There are 2 types of PPP authentication supported by the Cisco IOS. What are they? A.) PAP B.) PREDICTOR C.) MD5 D.) CHAP E.) STACKER F.) MSCHAP

4 Answers  


What is the role of the LLC sublayer?

0 Answers  


Which of the following encapsulation types can be used on leased-line connections? (Choose two) ❍ A. HDLC ❍ B. Frame Relay ❍ C. ISDN ❍ D. PPP

10 Answers   Wipro,


Categories