Correct Answer: You must use the terminal monitor command.
Explanation:
To see console messages through your Telnet session, you must enter the
terminal monitor command.
2. Using the following illustration, what would be the IP address of E0 if you were using the eighth subnet? The network ID is 192.168.10.0/28 and you need to use the last available IP address in the range. The zero subnet should not be considered valid for this question.
A /28 is a 255.255.255.240 mask. Let's count to the ninth subnet (we need to find the broadcast address of the eighth subnet, so we need to count to the ninth subnet). Starting at 16 (remember, the question stated that we will not use subnet zero, so we start at 16, not 0), 16, 32, 48, 64, 80, 96, 112, 128, 144. The eighth subnet is 128 and the next subnet is 144, so our broadcast address of the 128 subnet is 143. This makes the host range 129-142. 142 is the last valid host.
3. What are the two main types of access control lists (ACLs)?
Correct Answer: It is used to bypass the configuration in NVRAM.
Explanation:
The default configuration setting is
0x2102, which tells the router to load the IOS from flash and the configuration from NVRAM.
0x2142 tells the router to bypass the configuration in NVRAM so that you can perform password recovery.
5. The configuration register setting of 0x2102 provides what function to a router?
Options
A. Tells the router to boot into ROM monitor mode
B. Provides password recovery
C. Tells the router to look in NVRAM for the boot sequence
If you are on a 2950 switch, then the interface command is just
switchport mode trunk, since the 2950 can only run the IEEE 802.1Q version. However, a 3550 can run both ISL and 802.1Q, so you must use the encapsulation command. The argument to choose 802.1Q for a trunking protocol is
dot1q.
9. To test the IP stack on your local host, which IP address would you ping?