You copy a configuration from a network host to a router's RAM. The configuration looks correct, yet it is not working at all. What could the problem be?
Options
A. You copied the wrong configuration into RAM.
B. You copied the configuration into flash memory instead.
C. The copy did not override the shutdown command in running-config.
D. The IOS became corrupted after the copy command was initiated.
Correct Answer
The copy did not override the shutdown command in running-config.
Explanation
Since the configuration looks correct, you probably didn't screw up the copy job. However, when you perform a copy from a network host to a router, the interfaces are automatically shut down and need to be manually enabled with the
no shutdown command.
More questions
1. What command is used to stop RIP routing updates from exiting out an interface but still allow the interface to receive RIP route updates?
The best answers, the ones you need to remember, are that either an access control list is filtering the Telnet session or the VTY password is not set on the remote device.
4. Acknowledgments, sequencing, and flow control are characteristics of which OSI layer?
A reliable Transport layer connection uses acknowledgments to make sure all data is transmitted and received reliably. A reliable connection is defined by a virtual circuit that uses acknowledgments, sequencing, and flow control, which are characteristics of the Transport layer (layer 4).
5. How many non-overlapping channels are available with 802.11g?
Correct Answer: Issue the show cdp neighbors detail command on the router connected to the switch.
Explanation:
Although option A is certainly the "best" answer, unfortunately option D will work just fine and your boss would probably prefer you to use the
show cdp neighbors detail command.
7. What is the frequency range of the IEEE 802.11a standard?
A /27 (255.255.255.224) is 3 bits on and 5 bits off. This provides 8 subnets, each with 30 hosts. Does it matter if this mask is used with a Class A, B, or C network address? Not at all. The number of host bits would never change.
10. What are two purposes for segmentation with a bridge?