Which statement is true regarding the user exec and privileged
exec mode?
A.) The '?' only works in Privileged exec
B.) They are identical
C.) They both require the enable password
D.) User exec is a subset of the privileged exec
Answer / guest
Answer: D
The user exec mode is a subset of the privileged exec mode.
Only a
certain number of commands are available at the user exec mode.
| Is This Answer Correct ? | 4 Yes | 2 No |
What is the function of Layer 2 Switch?
Can you explain tunneling?
1 what is the number of telnet session in the cisco router a 1 b 2 c 3 d 4 e 5
On which interface we always apply access-list?
Repeaters work at which layer of the OSI model? A.) Network B.) Session C.) Transport D.) Physical
What is the main advantage of using switches?
Does a bridge divide a network into smaller sections?
what is full form of rst,smtps & http?
Identify the command to configure the router for IGRP autonomous system 100? A.) Router(config)# router igrp 100 B.) Router> router igrp 100 C.) Router# router igrp 100 D.) Router(config)# router igrp
Why OSI layers having 7 layers instead of one layer.
what is eigrp and what is the benfit of eigrp over igrp what is route summryization if one the router route is not showing the what should be problem how to resolve these problem what is fessible suceer. is the load balncing is one of the property of eigrp what is the metihod of authantication what is the diffrnec betwee pap and chap what is stp command for enabling stp and rstp why switching loop occur what is the main factor of ocuring switch loop what is the mechnaism for stoping the roting loop what is best diffrence betwwen ospf v1 nad ospf v2 what is vtp what is the diffrence between vtp version 1 and veron 2 what is the ip address what is the diffrence betwwen ip address mac address what is dhcp and how it work what is 3 way hand shake what is the difrence betwwen network id and brodcast id what is the network id for 111.111.111.10/29 what is the command for enabling vlan on 3650 csco switch
Most routing protocols recognize that it is never useful to send information about a route back out the direction from which the original packet came. This is an example of which routing technology? A.) Split Horizon B.) LMI C.) Triggered Updates D.) Poison Reverse E.) SYN, ACK F.) DLCI