What is the command to copy the IOS image to a TFTP server?
A.) copy flash tftp
B.) copy running-config tftp
C.) copy ios tftp
D.) copy startup-config tftp
Answers were Sorted based on User's Feedback
I have one problem in my network my windows xp pc in workgroup there r 2 NIC card one I have disable in and second is active. The problem is in a day some time its ip conflict with other and when I see the event log and get the conflict ip mac and scan it with LAN scanner on one is there for that mac address nic in my network I have disable dhcp also don’t know what is the problem
Your network uses a Class C address of 210.10.10.0. You must now split up the network into separate shores to handle multiple buildings separated by routers. Which two steps must you take to determine the proper shored mask for your networks? (Choose two) A. determine the number of seperate networks required B. determine how many devices will require DHCP addressing C. determine the maximum number of hosts that will be on each shored D. determine the miniumum number of hosts that will be on each shored E. determine which router will be the IP default gateway for each shored
What must be true for two routers running IGRP to communicate their routes? A.) Same autonomous system number B.) Connected using Ethernet only C.) Use composite metric D.) Configured for PPP
Hi, I cannot download anything on my office pc. only because of that i want online practice sites. anyway thanks for providing me website
Define load balancing?
What is the frame relay?
What command can be used to test IPX connectivity? A.) Ping 2e.000.0045.8923 B.) Ping 192.168.100.1 C.) Ping ipx 2e.0000.0045.8923 D.) Ipx ping 2e.0000.0045.8923
Identify the following components of the IPX address 2e.0000.0065.ed43 A.) Not a valid IPX address B.) Network = 2e, Subnet = 0000, Node = 0065.ed43 C.) Network = 2e.0000, Node = 0065.ed43 D.) Network = 2e, Node = 0000.0065.ed43
Which technologies listed below help prevent network loops in a switched (bridged) environment? A.) Store-and-Forward B.) IEEE 802.1d C.) Diikjstra Algorithm D.) Cut-Through E.) Spanning Tree Protocol F.) Routing
Which of the following are examples of the Transport Layer? A.) Token Ring B.) UDP C.) TCP D.) IP E.) SQL F.) LLC
If configuring a Cisco router to connect to a non-Cisco router across a Frame Relay network, which encapsulation type would you select? A.) Q933a B.) ISDN C.) IETF D.) CISCO E.) ANSI
Identify the switching method that examines the destination MAC address as the frame is being received then begins forwarding the frame prior to receiving the entire frame? A.) Fragment-free B.) Store and Forward C.) Cut-through D.) Fast forward