Which command do you use to set the Secret password to
'roundwood'?
A.) enable login roundwood
B.) enable password roundwood
C.) enable privilege roundwood
D.) enable secret= roundwood
E.) enable secret login roundwood
F.) enable secret roundwood
Hi all, Kindly can you tell me what is demand ccna voice in field and what is profile of ccna voice.so pl very urgent bcz i am going to join institute
In IOS boot sequence if the flash is erased, and there is no access to TFTP server, and we can't load the partial IOS from ROM. Is there any possiblity that we can still boot the router/switch from external PC in which the IOS is installed?
What are four functions/characteristics of the network layer of the OSI model? (Choose four) A. It uses a two-part address B. It maintains routing tables C. It uses broadcast addresses D. It establishes network addresses E. It provides access to the LAN media F. It provides media independence for upper layers G. It provides path selection for Internetwork communication
Which command, that is used to test address configuration, uses Time-To-Live (TTL) values to generate messages from each router. A) telnet B) ping C) trace D) bootp
What is the most common layer 2 device? A. Hub B. Router C. Switch D. Repeater
How the STP determinw that which Port should be Root Port, which port should be Designeted Port , Blocking Port and Forwarding Port in Layer 2 STP topology........ Hi friends Thanks for posting the answer of above given questions i agree with all of you that BPDU is the Protocol that are used to determine this is clear to me.. But I want to Know the Process like Why it Blocked the port Fa0/1 Insted of Fa0/2 waiting for Answer Posting .... Thanks in Advance
What command will not display the status of to1? A.) show int to1 B.) show to1 C.) show interface to1 D.) show interface
What is the maximum number of subnets that can be assigned to networks when using the address 172.16.0.0 with a subnet mask of 255.255.240.0? (Assume older version UNIX workstations are in use.) A. 16 B. 32 C. 30 D. 14 E. It is an invalid subnet mask for the Network.
I received a call from client that network is down. We have 100 or 1000 of switches and routers so how could we find the client switch and its port number? and useful commands to find this ?
what is a routing ?what is the use of routing?
8 Answers Google, IBM, Pacific, Tata Technologies,
What is STP and what is the difference between PVST and RSTP
let threr are three router 1 is cionected to two and two is conected to three that is 1----2----3 now we can ping 2 from 3 and 1 to two but we are not able to ping 1 to 3 let router 1 is local and rest of two are remote what should be urs troubleshoot steps