Identify the command that saves the configuration stored in
RAM to
NVRAM?
A.) copy running-config startup-config
B.) copy tftp running-config
C.) copy startup running
D.) copy active to backup
Answers were Sorted based on User's Feedback
Scenario: You created 2 access-lists for controlling telnet about a year ago, and bound one of them to Serial 0. You can't remember which access-list you used. Which command lets you see all access-lists on Serial 0 for telnet? A.) show access-list B.) show ip int s0 C.) show access-list telnet D.) show telnet access-list E.) show access-list s0 F.) show int s0
Identify the length of an IPX address and it's components? A.) 80 bits, 48 bits network and 32 bits node B.) 32 bits, 16 bits network and 16 bits node C.) None of the above D.) 80 bits, 32 bits network and 48 bits node
Explain the major types of networks and explain?
Which command displays the intenances using a given access list? A. show filters B. show ip interface C. show active lists D. show interface paramaters E. configure ip access lists F. show access-list interfaces
How many parts of ping?
Identify the command to configure a description on an interface? A.) Router> description Finance department B.) Router(config)# description Finance department C.) Router(config-if)# description Finance department D.) Router# description Finance department
What information is provided by the local management interface (LMI)? A.) LMI encapsulation type B.) The current DLCI values C.) The status of virtual circuits D.) The global or local significance of the DLCI values
What should be the first command to create an access-list that prevents all users on subnetwork 10.10.128.0, using subnet mask 255.255.192.0, from being able to telnet anywhere? A.) access-list 101 deny tcp 10.10.128.0 0.0.63.255 any eq telnet B.) access-list 101 deny tcp 10.10.128.0 255.255.0.0 any eq telnet C.) access-list 101 deny tcp 10.10.128.0 255.255.192.0 any eq telnet D.) access-list 101 deny tcp 10.10.128.0 0.0.192.255 any eq telnet E.) access-list 101 deny tcp 10.10.128.0 0.0.128.255 any eq telnet F.) access-list 101 deny tcp 10.10.128.0 0.0.127.255 any eq telnet
Which of the following is an example of the Physical Layer? A.) SQL B.) IP C.) LLC D.) DDP E.) Ethernet
Which layer of the 7 layer model is responsible for representing the application information between 2 different OS's? For example, converting ASCII to EBCIDIC. A.) Transport B.) Application C.) Physical D.) Session E.) Presentation F.) Network
Identify 3 feature of access-lists? A.) Implicit deny will deny any packets not matched B.) Processed sequentially from bottom to top C.) Processed sequentially from top to bottom D.) If a packet is denied it would be tested against the remaining statements in the access-list E.) Once a match is made the packet is either denied or permitted F.) Enabled on all interfaces by default
Identify the command to configure the router for IGRP autonomous system 100? A.) Router(config)# router igrp 100 B.) Router> router igrp 100 C.) Router# router igrp 100 D.) Router(config)# router igrp