Identify the 2 commands that save the running-config to a TFTP
server?
A.) write running tftp
B.) copy running network
C.) copy running tftp
D.) write network
What is the 5-4-3-2-1 rule of network design?
In which protocol supenetting is enable by default?
Inverse ARP serves what purpose? A.) Method for a local router to introduce itself to the remote end of the connection B.) Broadcast a routing table update C.) Identify MAC addresses if the IP address is known D.) Sent every 10 seconds used to verify the Frame Switch is still active
Which statement about Ethernet switches is true? A. Symmetric switching allows connection between pods of unlike bandwidth and does not require memory buffering B. Memory Buffering is used to prevent a bottleneck when pods of different bandwidth are connected on a symmetric switch C. The latency can be reduced if the switch utilizes the store and forward method of switching store and forward is better for error detection D. The cut through method of switching is faster because the switch forwards the packet to the destination as soon as it reads the destination address
Identify the 2 commands to copy a configuration from a TFTP server to RAM? A.) configure network B.) configure overwrite C.) copy backup-config running-config D.) copy tftp running-config
Explain on which interface we always apply access-list?
If you are in IOS user mode, which command do you use to enter the privileged mode? A. Set B. Enable C. Configure D. Privileges
How broadcast is created in switch
the term which used for describe physical alyout of network mine answer-topology
MIDI and MPEG are examples of what layer of the OSI seven layer model? A.) Session B.) Network C.) Datalink D.) Transport E.) Application F.) Presentation
How many valid ip will b in /21 in route summarization?
Explain the benefits of VLANs.