Which statement is true regarding the user exec and privileged
exec mode?
A.) The '?' only works in Privileged exec
B.) They are identical
C.) They both require the enable password
D.) User exec is a subset of the privileged exec
Answer / guest
Answer: D
The user exec mode is a subset of the privileged exec mode.
Only a
certain number of commands are available at the user exec mode.
| Is This Answer Correct ? | 4 Yes | 2 No |
1.hi all, my question is how maximum number of ports can exist in a switch? 2.Which type of switching good in using and why?
Cisco routers can secure the enable password with a one-way hash algorithm. What command would encrypt the enable password with the strong encryption method? A.) enable encrypt john B.) password john C.) enable secret john D.) enable password john E.) secret john F.) enable password 5 john
How many Frame-relay encapsulation types are available with Cisco routers? A.) Four B.) Two C.) Five D.) Three
With one method for transmitting frames through a switch, the switch receives the complete frame and checks the frame CRC before forwarding the frame. What is the switch transmission method called? A. CSMA/CD B. Full Duplex C. Cut-Through D. Half-Duplex E. Fragmentation F. Store and Forward
hi friends i have a problem.plz solve this. i am working some where and i have the number of swtitch.once my project manger says that we are going to exapnd our number of employ so plz attech an another switch.i asked to my jr network engineer that take a witch and implemnt on that n/w,as he implement the switch on that n/w.thats network get down, plz tell me what is the reason of that.
Which OSI layer end to end communication, segmentation and re-assembly? A.) Network B.) Transport C.) Physical D.) Application E.) Data-Link F.) Presentation
Identify the true statement regarding subnetting? A.) Allows for more host address B.) Borrow bits from the network portion of the address C.) Allows for unlimited number of networks D.) Borrow bits from the host portion of the address
Which command displays all the commands in the history buffer? A. CTRL H B. show buffer C. show history D. show history buffer
switch kitne volt per work karta hai. what is frame realy. what is isdn and pri and bri.
Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.
You have a Class B network address divided into 30 subnets. You will add 25 new subnets within the next year. You need 600 host IDs for each subnet. Which subnet mask should you use? A.) 255.254.0.0 B.) 255.192.0.0 C.) 255.255.252.0 D.) 255.255.248 0
What are the two primary operating modes for frame switching? A. Full Duplex B. Half-Duplex C. CSMA/CD D. Cut-through E. Fragmentation F. Store and Forward G. User mode H. Privileged mode