Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...


You want a message to be displayed every time someone tries
to log

on to the router. Which command is required to accomplish
this task?

A.) motd#(message)#

B.) banner motd(message)

C.) banner motd#(message)#

D.) banner motd*(message)

E.) banner login#(message)#



You want a message to be displayed every time someone tries to log on to the router. Which comma..

Answer / agato

Answer : C.) banner motd# (message)#

Example : Router>en
Router#conf t
Router(config)#banner motd # Hello World #
Router(config)#end
Router#write

Is This Answer Correct ?    2 Yes 0 No

Post New Answer

More CCNA Interview Questions

What is difference between routing and routed protocols?

0 Answers  


Identify the access-list range for an extended IP access-list? A.) 800 - 899 B.) 1 - 99 C.) 1000 - 1099 D.) 100 - 199

4 Answers  


which utility should use to test whether TCP/IP has been initialized on a system.friends plz post the answer with explaination..

3 Answers  


What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6

1 Answers  


What are the different types of the password used in securing a cisco router?

0 Answers  


Identify IPX SAP and it's purpose? A.) Sonet Access Pipe - interface to Sonet ring B.) Service Advertising Protocol - advertise services C.) Server Appletalk Protocol - appletalk directory services D.) Service Access Point - identify upper layer protocols

3 Answers  


What is the first step in data encapsulation? A.) User information is converted into data. B.) Frames are put into bits. C.) Data is converted into segments. D.) Segments are converted into datagrams and packets. E.) Packets are put into logical frame.

1 Answers  


The two sublayers of the IEEE Data Link Layer are which of the following? A.) Link and Logical Control B.) Data Link and LLC C.) Logical Link Control and Media Access Control D.) Data Link and MAC

3 Answers  


Which defined peer ip address an local subnet belong to crete?

0 Answers  


Hi, Jitendra/Shahin You both are masters of networking na. I am worrying about my exam. Is it vey tough?because my friend got failed in ccna. he is very talented person thogh he failed.

1 Answers  


What is Cisco register bits? How they help?

1 Answers   jetking,


A default route is analogous to a _________. A. default gateway B. static route C. dynamic route D. one-way route

1 Answers  


Categories