What is the command to copy the IOS image to a TFTP server?
A.) copy flash tftp
B.) copy running-config tftp
C.) copy ios tftp
D.) copy startup-config tftp
Answers were Sorted based on User's Feedback
IPX routing updates occur how often? A.) Every 30 seconds B.) Every 60 seconds C.) Only as needed D.) When the remote router asks for an update
What does the command show access-lists 101 list? A. all defended access lists B. all access lists within the router C. the contents of standard access list 101 D. the contents of defended access list 101
Using the access-list command, 'access-list 1 deny 2.2.2.2', what else must be done to stop host 2.2.2.2 from sending any traffic out of physical interface E0, while still allowing other traffic? A.) In global mode, Add a line - 'access-list 1 permit 0.0.0.0 255.255.255.255' B.) On interface E0, Add a line - 'access-group 1 in' C.) In global mode, Add a line - 'access-list 1 permit all' D.) On interface E0, Add a line - 'access-list 1 in' E.) On interface E0, Add a line - 'access-list 1 out' F.) On interface E0, Add a line - 'ip access-group 1'
What is the default behavior of access-list?
What does the command “IP name-server 255.255.255.255″ accomplish? a.It disables domain name lookup. b.It sets the domain name lookup to be a local broadcast. c.This is an illegal command. d.The command is now defunct and has been replaced by “IP server-name ip any”
Which protocol works at the Internet layer and is responsible for making routing decisions? A.) UDP B.) IP C.) TCP D.) ARP
What does vlan provide?
Which mathematically form used inipv6?
What does the IPX maximum path command do? A.) Allows you to disable the TTL on an IPX packet B.) This parameter is only used in NLSP routing C.) Sets the maximum metric that can appear in the routing table D.) Configures round robin load sharing over multiple equal metric paths (parallel paths)
Which statement about an IP network is true? A. A broadcast source MAC address contains all zeros B. A MAC address is part of the physical layer of the OSI model C. MAC addresses are used by bridges to make forwarding decisions. IP address are used by routers. D. IP addresses allow a flat addressing scheme. MAC addresses use a hierarchical addressing scheme.
Hi friend , This is Harekrushna . I have been tried for netsim keygen but i could not download this crack file .if it download then showes the writer protect error. PLEASE sugest me what isthe soluation. or any other software avalibe for pratics the network .
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?