Identify the command to copy a configuration file from a TFTP

server to a routers active configuration?

A.) Router# copy running-config tftp

B.) Router# copy tftp running-config

C.) Router# copy tftp 172.16.0.1 running-config

D.) Router(config)# copy tftp running-config

Answers were Sorted based on User's Feedback



Identify the command to copy a configuration file from a TFTP server to a routers active configur..

Answer / kathy

B

Is This Answer Correct ?    2 Yes 0 No

Identify the command to copy a configuration file from a TFTP server to a routers active configur..

Answer / chandan singh

(B)copy tftp: running-config

Is This Answer Correct ?    0 Yes 0 No

Identify the command to copy a configuration file from a TFTP server to a routers active configur..

Answer / guest

Answer: D

Is This Answer Correct ?    0 Yes 2 No

Post New Answer

More CCNA Interview Questions

What does a Standard IP Access-list use as test criteria? A.) IP source address B.) IP source and destination address, protocol numbers and port numbers C.) IPX source and destination address D.) Source MAC address

1 Answers  


Company XYZ has an employee that works out of the home. The employee runs big client server applications and must quickly transfer large files. The company wants the best cost/benefit on this connection. What would be the most practical solution? A. an ISDN Basic Rate Interface (BRI) connection to the user at home B. a dedicated T1 connection to the user at home C. a dedicated Frame Relay connection to the user at home D. a standard 28.8 analog dialup connection to the user at home

2 Answers  


Which router command allows you to determine if an IP access list is enabled on a particular interface? A. Router# show ip interface B. Router> show access-list C. Router# show ip access-list D. Router> show interface ip access-list E. Route 1 P.O. box 198

2 Answers  


Identify the true statements about the following access list: Access-list 101 deny tcp 192.10.172.0 0.0.0.255 any eq 23 Access-list 101 permit ip any any A.) This access list prevents the host 192.10.172.0 from telneting B.) This access list prevents any telnet traffic from subnet 192.10.172.0/24 C.) This access list filters some telnet access D.) This access list denies any telnet traffic to subnet 192.10.172.0/24 E.) This access list is invalid F.) The netmask on the this access list is reversed

1 Answers   HCL,


What is the result of segmenting a network with a router into segments 1 and 2? A. It increases the number of collisions B. It decreases the number of broadcast domains C. It connects segment 1 and broadcasts to segment 2 D. It connects segment 1 and broadcasts from genre to segment 2

2 Answers  






Identify 3 ways in which a router can be configured? A.) TFTP B.) Nvram C.) Ping D.) Console E.) Trace

2 Answers  


What is the terminal emulation, in which layer it comes?

0 Answers  


what is the distance betwwen link stae routing protocl and distance vector who have the best convergence toplogy eigrp conatain 3 table name them what the toplogy table contain

5 Answers   IBM,


Can you explain L2TP?

0 Answers   CCIE,


Tell me how many hop counts are by default and how much you can increase in eigrp protocol?

0 Answers  


Which of the following describe SMTP? A.) Used for downloading files to the router. B.) Used for sending e-mail. C.) Uses TCP. D.) Uses UDP. E.) Uses port 25. F.) Used for managing IP devices.

1 Answers  


Identify 3 characteristics of the Network layer (OSI layer 3)? A.) Connnection oriented B.) Path determination C.) Supports multiplexing D.) Manages sessions E.) Packet forwarding

1 Answers  


Categories