Golgappa.net | Golgappa.org | BagIndia.net | BodyIndia.Com | CabIndia.net | CarsBikes.net | CarsBikes.org | CashIndia.net | ConsumerIndia.net | CookingIndia.net | DataIndia.net | DealIndia.net | EmailIndia.net | FirstTablet.com | FirstTourist.com | ForsaleIndia.net | IndiaBody.Com | IndiaCab.net | IndiaCash.net | IndiaModel.net | KidForum.net | OfficeIndia.net | PaysIndia.com | RestaurantIndia.net | RestaurantsIndia.net | SaleForum.net | SellForum.net | SoldIndia.com | StarIndia.net | TomatoCab.com | TomatoCabs.com | TownIndia.com
Interested to Buy Any Domain ? << Click Here >> for more details...

Which statement is true regarding the user exec and privileged

exec mode?

A.) The '?' only works in Privileged exec

B.) They are identical

C.) They both require the enable password

D.) User exec is a subset of the privileged exec

Answer Posted / guest

Answer: D

The user exec mode is a subset of the privileged exec mode.
Only a

certain number of commands are available at the user exec mode.

Is This Answer Correct ?    4 Yes 2 No



Post New Answer       View All Answers


Please Help Members By Posting Answers For Below Questions

What are the ranges of private ips?

1300


Can you explain voluntary and compulsory tunnels?

1833


Suppose there are 3 pc's pc1 pc2 and pc3 all are connected with each other pc 1 is able to ping pc2 and pc3 but pc2 and pc 3 not able to ping pc 1 then what is an issue troubleshoot it?

2161


In eigrp metric parameters which 2 options are enable by default?

1088


Explain what is the size of hello packets in eigrep protocol?

1053


Explain the types of ospf configuration?

2573


Why is UDP lease favored when compared to TCP?

1341


What is the size of ipv4?

1095


Brielfly explain the conversion steps in data encapsulation

1283


What are the different IPX access lists?

1156


What is the usage of service password encryption?

1310


Explain the terms unicast, multicast, broadcast.

1068


What is the minimum request timer?

1049


Why is network segmentation a good idea when managing a large network?

1096


Why we used Virtual MAC in GLBP

2337