logo

CuriousTab

CuriousTab

Discussion


Home Networking IOS and Security Device Manager See What Others Are Saying!
  • Question
  • What keystroke will terminate setup mode?


  • Options
  • A. Ctrl+Z
  • B. Ctrl+^
  • C. Ctrl+C
  • D. Ctrl+Shift+^

  • Correct Answer
  • Ctrl+C 

    Explanation
    You can exit setup mode at any time by using the keystroke Ctrl+C.

  • More questions

    • 1. What command is used to create a backup configuration?

    • Options
    • A. copy running backup
    • B. copy running-config startup-config
    • C. config mem
    • D. wr mem
    • Discuss
    • 2. How long is an IPv6 address?

    • Options
    • A. 32 bits
    • B. 128 bytes
    • C. 64 bits
    • D. 128 bits
    • Discuss
    • 3. What is the administrative distance of OSPF?

    • Options
    • A. 90
    • B. 100
    • C. 110
    • D. 120
    • Discuss
    • 4. If your router is facilitating a CSU/DSU, which of the following commands do you need to use to provide the router with a 64000bps serial link?

    • Options
    • A. RouterA(config)#bandwidth 64
    • B. RouterA(config-if)#bandwidth 64000
    • C. RouterA(config-if)#clock rate 64
    • D. RouterA(config-if)#clock rate 64000
    • Discuss
    • 5. Which is true regarding EIGRP successor routes?

      1. A successor route is used by EIGRP to forward traffic to a destination.
      2. Successor routes are saved in the topology table to be used if the primary route fails.
      3. Successor routes are flagged as "active" in the routing table.
      4. A successor route may be backed up by a feasible successor route.
      5. Successor routes are stored in the neighbor table following the discovery process.

    • Options
    • A. 1 and 3
    • B. 2 and 3
    • C. 1 and 4
    • D. 3, 4 and 5
    • Discuss
    • 6. Which of the following would be good reasons to run NAT?

      1. You need to connect to the Internet and your hosts don't have globally unique IP addresses.
      2. You change to a new ISP that requires you to renumber your network.
      3. You don't want any hosts connecting to the Internet.
      4. You require two intranets with duplicate addresses to merge.

    • Options
    • A. 1, 2 and 4
    • B. 2 and 4
    • C. 3 only
    • D. All of the above
    • Discuss
    • 7. Which of the following are benefits of VLANs?

      1. They increase the size of collision domains.
      2. They allow logical grouping of users by function.
      3. They can enhance network security.
      4. They increase the size of broadcast domains while decreasing the number of collision domains.
      5. They simplify switch administration.
      6. They increase the number of broadcast domains while decreasing the size of the broadcast domains.

    • Options
    • A. 1 and 5
    • B. 2 and 4
    • C. 1, 3 and 5
    • D. 2, 3 and 6
    • Discuss
    • 8. You have a network that needs 29 subnets while maximizing the number of host addresses available on each subnet. How many bits must you borrow from the host field to provide the correct subnet mask?

    • Options
    • A. 2
    • B. 3
    • C. 4
    • D. 5
    • Discuss
    • 9. Which of the following are TCP/IP protocols used at the Application layer of the OSI model?

      1. IP
      2. TCP
      3. Telnet
      4. FTP
      5. TFTP

    • Options
    • A. 1 and 3
    • B. 1, 3 and 5
    • C. 3, 4 and 5
    • D. All of the above
    • Discuss
    • 10. You connect a host to a switch port, but the new host cannot log into the server that is plugged into the same switch. What could the problem be?

    • Options
    • A. The router is not configured for the new host.
    • B. The VTP configuration on the switch is not updated for the new host.
    • C. The host has an invalid MAC address.
    • D. The switch port the host is connected to is not configured to the correct VLAN membership.
    • Discuss


    Comments

    There are no comments.

Enter a new Comment