Identify command that configures 'Cisco1' as a secret password?
A.) Router(config)# enable secret password Cisco1
B.) Router(config)# enable secret cisco1
C.) Router(config)# enable password Cisco1
D.) Router(config)# enable secret Cisco1
Answers were Sorted based on User's Feedback
Explain the draw back of ospf protocol?
Explain the difference between tracert and traceroute?
hi... i am usin packet tracer 5.0.. i hav connect two routers A and B. A has 200.100.25.100 and 1.0.0.1 and router B has 200.100.50.100 and 1.0.0.2... i hav connected 1.0.0.1 and 1.0.0.2... now i want to route 200.100.25.100 and 200.10.50.100 usin rip.. i enable rip in both the routers... but whn i give the command show ip route... i jus get this Codes: C - connected, S - static, I - IGRP, R - RIP, M - mobile, B - BGP D - EIGRP, EX - EIGRP external, O - OSPF, IA - OSPF inter area N1 - OSPF NSSA external type 1, N2 - OSPF NSSA external type 2 E1 - OSPF external type 1, E2 - OSPF external type 2, E - EGP i - IS-IS, L1 - IS-IS level-1, L2 - IS-IS level-2, ia - IS-IS inter area * - candidate default, U - per-user static route, o - ODR P - periodic downloaded static route Gateway of last resort is not set A# so can sombody tell me where i hav gone wrong... thanku
What is the protocol number for TCP? A.) 80 B.) 21 C.) 11 D.) 6
Can you explain PAP?
Which protocol will send a message to routers if a network outage or congestion occurs? A.) ARP B.) TCP C.) IP D.) ICMP
What key do you use to view the last command? A.) Ctrl+X B.) Ctrl+Z C.) Ctrl+E D.) Ctrl+P
What is the command to allow you to type Tokyo instead of the IP address 172.16.30.1 to access a router named Tokyo? A.) config t, ip host Tokyo 172.16.30.1 B.) config t, ip hostname Tokyo 172.16.30.1 C.) config t, hostname Tokyo 172.16.30.1 D.) config t, ip hostname 172.16.30.1 Tokyo
Suppose a Switch interface went in error-dis mode what you will do for Troubleshooting List all Possibilities
Define the different kinds of casting
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
What is the key advantage of using a switches?