Which EXEC command displays system hardwarde configuration
information software version and the names and sources of
configuration files and boot images on a router?
A. show boot
B. show flash
C. show config
D. show version
Choose three reasons why the networking industry uses a layered model: A.) It facilitates systematic troubleshooting B.) It allows changes in one layer to occur without changing other layers C.) It allows changes to occur in all layers when changing one protocol D.) It clarifies how to do it rather than what general function to be done E.) It clarifies what general function is to be done rather than how to do it
what is subnetting?
What is the correct command line syntax for configuring a port on a 7000 or 7500 series Cisco router with a VIP card? A.) port B.) port adapter/port C.) You can't put a VIP card in a 7000 or 7500 router. D.) slot/port-adapter/port E.) slot/port F.) slot
How do i decide if an extended access-list is in or out?
Which of the following will show an extended access list 150? A.) sh access-list B.) sh ip int C.) sh ip access-list 150 D.) sh access-list 150 extended
What is the default encapsulation of Netware 3.12? A.) Ethernet_II B.) 802.5 C.) 802.2 D.) 802.3
hi friend i am sending some interview question which is asked from me at volvo hope this will help you of all 1 what is mpls al question is posted by jitendera kumar sinha
0 Answers ALU, TATA, Volvo, Wipro,
Identify the 2 commands that copies the configuration in NVRAM to RAM? A.) copy backup-config running-config B.) configure nvram C.) copy startup-config running-config D.) configure memory
What is the IEEE specification for Spanning Tree Protocol? A.) 802.9 B.) 803.ud C.) 803 D.) 802.1d
What is a vlan? What does vlan provide?
What does the parameter -- LOG -- do on an IPX access list? A.) The log keyword is not a valid option. B.) Read the LOG to figure out what traffic to deny. C.) Logs the creation of the access list. D.) Logs IPX access control list violations whenever a packet matches a particular access list entry. E.) Ensures the IPX protocol places a log in the fireplace.
What are the two types of access lists that can be configured on a Cisco router? A. Standard B. Extended C. Filtering D. Packet