Identify the hardware component used to store buffers, tables,
running-configuration etc?
A.) NVRAM
B.) ROM
C.) RAM
D.) Flash
Answers were Sorted based on User's Feedback
Answer / dhruv agarwal
The answer is RAM as the running-config is stored in a RAM
(Random Accesss Memory)
Startup-config is stored in a ROM(Read only Memory)
Flash memory is used to store the IOS of a device
NVRAM is used to store the configuration file of the router
to store the new;y configuration into NVRAM used the
command
Router#copy run start
| Is This Answer Correct ? | 2 Yes | 2 No |
Answer / zibrayal.s.mulla
it is the flash who mentain the information ,, however even
it is powered down,, when it is powered on, it will back to
the status, because the contents are saved in "flashing
chip"...-
| Is This Answer Correct ? | 0 Yes | 0 No |
Identify 3 characteristics of an IP address? A.) Contains a network portion and a host portion B.) 32 bits long C.) Unique to each network D.) Part of the default Cisco configuration E.) Referred to as the hardware address
In version 11.2 of the IOS, a Cisco router configured for frame-relay can automatically detect the LMI type. What is this known as? A.) Psychic B.) ESP C.) Inverse ARP D.) Hello E.) Reverse ARP F.) Autosense
What would be the proper wildcard mask to permit all odd numbered hosts on the 10.48.0.0/12 network? access-list 1 permit 10.48.0.0 0.15.255.255 access-list 1 permit 10.48.0.1 0.15.255.254 access-list 1 permit 10.48.0.0 0.15.255.1 access-list 1 permit 10.48.0.0 0.0.0.254 access-list 1 permit 10.48.0.0 0.0.0.255
When you mistakenly type the wrong command at the Router# prompt the router does a DNS lookup which takes about 20 seconds. Which command can you enter to prevent the router doing this in future?
What is the difference between dynamic ip and static ip addressing?
Using the TCP/IP protocol suite a message is sent from host A to a destination IP address on the same LAN. How does host A determine the destination of MAC address? A. It uses a proxy APP B. It uses APP requests C. It uses RARP requests D. It uses a router lookup table
which algorithm as defined by the transform set is used for providing data confidentiality when connected to tyre?
what is nat.types of nat
what is the matric of EIGRP protocol?
What is a L2F protocol?
How many types of IP routings?
14 Answers CK, TCS,
Which company mange api's?