What is the command to copy the IOS image to a TFTP server?
A.) copy flash tftp
B.) copy running-config tftp
C.) copy ios tftp
D.) copy startup-config tftp
Answers were Sorted based on User's Feedback
let there are three switch and there are 3 ree valn craed on each switch that is vlan 2 on first switch valn 3 on 2nd switch and vlan 4 is cretaed on switch 3 i have implemnted intervlan routin through ciso switchses. the router is conected through its fa0/1 port by one switch and and the two switch are trunked with each other now question is that we want to comuniacte betwwen vlan but does alse want that only vlan 2 is allow to access internet (ISP)which is conected through s0 interface of router.and no any vlan can access that internet.what should be solution.
Identify the 3 guidelines for routers in the same autonomous system? A.) Must be configured for IGRP or RIP B.) Interconnected C.) Assigned the same autonomous system number D.) Configured for the same routing protocol E.) Must be same model of router
what is the concept of HA and FA in VPN tunneling?
The -- terminal no editing -- command will perform what function? A.) Edit the contents of NVRAM B.) Allows access to the terminal port C.) Stops the advanced editing feature D.) Enable password functions
Which type of switching reads just the address portion of the frame and then immediately starts forwarding it? A.) Cut-Through B.) Store-and-Forward C.) Tabling D.) Routing E.) Inverse ARP F.) Fast Forward
Your company has been assigned the IP address of 201.222.5.0 and require having 20 subnets. As the company’s network administrator, find the following: a) the subnet mask (2 marks) b) the number of useable subnets (2 marks) c) the subnetwork address for the 4th subnet (2 marks) d) the first usable IP address for the 4th subnet (2 marks) e) the last usable IP address for the 4th subnet (2 marks) f) the broadcast address for the 4th subnet. (2 marks)
Name the command we give on privilege mode for coming back to user execution mode?
Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config running-config B.) configure nvram C.) copy startup-config running-config D.) configure memory
Why do you use ‘service password encryption’?
Name the different types of networks
The Internet Control Message Protocol occurs at what layer of the seven layer model? A.) Physical B.) Transport C.) Session D.) Datalink E.) Presentation F.) Network
What is Route Poisoning?