logo

CuriousTab

CuriousTab

Discussion


Home Networking Networking Basics See What Others Are Saying!
  • Question
  • To back up an IOS, what command will you use?


  • Options
  • A. backup IOS disk
  • B. copy ios tftp
  • C. copy tftp flash
  • D. copy flash tftp

  • Correct Answer
  • copy flash tftp 

    Explanation
    The command copy flash tftp will prompt you to back up an existing IOS in flash to a TFTP host.

  • More questions

    • 1. Which is true regarding EIGRP successor routes?

      1. A successor route is used by EIGRP to forward traffic to a destination.
      2. Successor routes are saved in the topology table to be used if the primary route fails.
      3. Successor routes are flagged as "active" in the routing table.
      4. A successor route may be backed up by a feasible successor route.
      5. Successor routes are stored in the neighbor table following the discovery process.

    • Options
    • A. 1 and 3
    • B. 2 and 3
    • C. 1 and 4
    • D. 3, 4 and 5
    • Discuss
    • 2. Which of the following would be good reasons to run NAT?

      1. You need to connect to the Internet and your hosts don't have globally unique IP addresses.
      2. You change to a new ISP that requires you to renumber your network.
      3. You don't want any hosts connecting to the Internet.
      4. You require two intranets with duplicate addresses to merge.

    • Options
    • A. 1, 2 and 4
    • B. 2 and 4
    • C. 3 only
    • D. All of the above
    • Discuss
    • 3. Which of the following are benefits of VLANs?

      1. They increase the size of collision domains.
      2. They allow logical grouping of users by function.
      3. They can enhance network security.
      4. They increase the size of broadcast domains while decreasing the number of collision domains.
      5. They simplify switch administration.
      6. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

    • Options
    • A. 1 and 5
    • B. 2 and 4
    • C. 1, 3 and 5
    • D. 2, 3 and 6
    • Discuss
    • 4. You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?

    • Options
    • A. 2
    • B. 3
    • C. 4
    • D. 5
    • Discuss
    • 5. Which of the following are TCP/IP protocols used at the Application layer of the OSI model?

      1. IP
      2. TCP
      3. Telnet
      4. FTP
      5. TFTP

    • Options
    • A. 1 and 3
    • B. 1, 3 and 5
    • C. 3, 4 and 5
    • D. All of the above
    • Discuss
    • 6. You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be?

    • Options
    • A. The router is not configured for the new host.
    • B. The VTP configuration on the switch is not updated for the new host.
    • C. The host has an invalid MAC address.
    • D. The switch port the host is connected to is not configured to the correct VLAN membership.
    • Discuss
    • 7. What does a VLAN do?

    • Options
    • A. Acts as the fastest port to all servers.
    • B. Provides multiple collision domains on one switch port.
    • C. Breaks up broadcast domains in a layer 2 switch internetwork.
    • D. Provides multiple broadcast domains within a single collision domain.
    • Discuss
    • 8. Where are EIGRP successor routes stored?

    • Options
    • A. In the routing table only
    • B. In the neighbor table only
    • C. In the topology table only
    • D. In the routing table and the topology table
    • E. In the routing table and the neighbor table
    • Discuss
    • 9. What are reasons for creating OSPF in a hierarchical design?

      1. To decrease routing overhead
      2. To speed up convergence
      3. To confine network instability to single areas of the network
      4. To make configuring OSPF easier

    • Options
    • A. 1, 2 and 3
    • B. 3 only
    • C. 3 and 4
    • D. 2, 3 nd 4
    • Discuss
    • 10. Which of the following is the valid host range for the subnet on which the IP address 192.168.168.188 255.255.255.192 resides?

    • Options
    • A. 192.168.168.129-190
    • B. 192.168.168.129-191
    • C. 192.168.168.128-190
    • D. 192.168.168.128-192
    • Discuss


    Comments

    There are no comments.

Enter a new Comment