Identify the command to configure the configuration-register?

A.) Router# config-register 0x2102

B.) Router(config)# config-register 0x2102

C.) Router(config-reg)# 0x2102

D.) Router> config-register 0x2102



Identify the command to configure the configuration-register? A.) Router# config-register 0x2102 ..

Answer / guest

Answer: B?

Is This Answer Correct ?    6 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is the icmp protocol?

0 Answers  


Identify 3 IP applications? A.) AURP B.) ARP C.) Telnet D.) SMTP E.) DNS F.) RARP

2 Answers  


All equipment located at the customers site is called: A.) CPE B.) CO C.) DCE D.) Demarc E.) DTE

1 Answers  


Which statement is true regarding the user exec and privileged exec mode? A.) The '?' only works in Privileged exec B.) They are identical C.) They both require the enable password D.) User exec is a subset of the privileged exec

1 Answers  


1.i have to pcs in the network 192.168.1.1 202.55.88.16 2. if that fails shud go through 122.16.1.3 and and if that comes back active it shud go through 202.55.88.16 itself

1 Answers  






What is the distance limitation for 100BaseT? A. 607 ft B. 25 Meters C. 1,000 ft D. 185 Meters

1 Answers  


NetWare IPX addressing uses a network number and a node number. Which statements are true? A. The network address is administratively assigned and can be up to 16 hexadecimal digits long. B. The node address is always administratively assigned. C. The node address is usually the MAC address. D. If the MAC address is used as the node address, then IPX eliminates the use of ARP.

1 Answers  


Which type of LAN segmentation device enables high speed data exchange? A. hub B. bridge C. switch D. repeater

3 Answers   Accenture, TCS,


What is the default interval for SAP updates? A.) 60 seconds B.) 15 seconds C.) 30 seconds D.) 120 seconds

1 Answers  


Using the TCP/IP protocol suite a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses RARP requests D. It uses a router lookup table

1 Answers  


Which layer called error detection layer?

0 Answers  


How does L2TP process?

0 Answers   CCIE,


Categories