Cisco Systems 2 manual 111

Page 111

640 - 607

Incorrect Answers:

C is incorrect; hierarchical areas make for a more efficient use of address but will not prevent loops.

D is incorrect; link State is a different method than Vector Routing, they are not combined for loop elimination.

Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 266-270.

Q. 178

Which command should you use to configure a router so that it can become a TFTP host for router system image that is run in Flash?

A.Copy flash tftp

B.Config tftp server

C.Write network <router name>

D.Tftp-server system <filename>

E.Setup server tftp <systemname>

Answer: A

Explanation: This is a poorly written question. When interrupted this question is asking how can a tftp server can use use a routers IOS image that is stored in the flash memory. The answer is use the command copy flash tftp.

B is incorrect; this is not a valid command.

C is incorrect; this is not a valid command.

D is incorrect; this is not a valid command.

Q. 179

Which commands loads a new version of Cisco IOS into the router?

A.Copy flash ftp

B.Copy ftp flash

C.Copy flash tftp

D.Copy tftp flash

Answer: D

Explanation: Whenever you need to load a new copy of the IOS onto the router (because the old one is damaged or you are upgrading you can download a copy of the new image from the tftp server. The proper command is copy tftp flash.

Leading the way in IT testing and certification tools, www.testking.com

- 111 -

Image 111
Contents Ccna Important Note Please Read Carefully Answer D Explanation Which command displays the configuration register setting?Answer D Incorrect AnswersAnswer B Explanation Answer C ExplanationExhibit Answer a Explanation Answer B Answer C During encapsulation in which order is information packaged?Answer E Explanation Answer A, B, E Answer F Explanation Answer a What is the result of segmenting a network with a bridge?Physical layer Data layer Network layer Transport layer Host 1-1 can ping Host Answer B, D, F Answer A, B and EAnswer A, B, D 640 Answer A, D, F Answer B, C, E Answer A, D Cable #1 Cable #2 Cable #3 Cable #4 Answer A, B 640 Answer D What is the likely cause of this problem? Answer A, C, D Answer Answer B, F 640 RIP Ospf Eigrp Igrp Answer Explanation Answer A, B, D, E Answer D Is incorrect this is not a valid command Answer B Answer D Answer A, C, D, E Answer E Which of the following are true?What is a benefit of a virtual LAN VLAN? Answer C, D Answer B Given the configuration example Answer D, E Explanation Answer A, E, F Which two statements about IP RIP are true? Choose two Answer D, FHow does inter-VLAN communication take place? Answer A, B, C, and D CSMA/CD Answer A, D Which two statements about a bridge are true. Choose two Which statement about an IP network is true? Answer A, B, C, G 10.0.0.0 to 172.16.0.0 to 192.168.0.0 toExplanation Which statement is true? Incorrect Options Answer A, B, D ExplanationAnswer A, C, E Which two protocol tools use ICMP? Choose two Answer a and BAnswer A, C Which command successfully ping an individual IP address?One Two None Several Which commands should you use to enable Igrp routing? Answer E Answer A, B, C Explanation Answer A, B, C Answer B, DWhat is the bandwidth capacity of an Isdn B channel? Answer a Which statement about Ethernet networks is true? What is the distance limitation for 100BaseT? Which command sets the clock rate to 56 Kbps on serial0? Setup dialogue what do the square bracket indicate? Which command retrieves the configuration file from NVRAM? What is the most common Layer 2 device? SAP Hdlc ARP Novellether Answer a Answer D Answer A, C What are two components of an IPX address? Answer B, C Explanation Answer C, D, E, F Answer F Answer a and d Which two statements are true? Choose twoWhat is a backoff on an 802.3 network? What is a key use of a device hardware address? 16,382 65,534 Session Network Transport Maintenance 640 Answer A, C Explanation What are the characteristics of UDP? MAC LLC SAP LCP Tab Ctrl R Spacebar Right Arrow PPP Lapd Isdn Hdlc What does the command show access-list 101 list? Which two commands show your access lists? Choose twoAnswer B, C IP and IPX IP and PPP PPP and Sdlc PPP and Hdlc 640 What are two functions of Icmp protocol? Choose Two Answer C, D, E ExplanationAnswer D, E 172.37.2.55 to What does the term ‘Base’ refer to in 100BaseT? Click the task button & Place the encapsulation Answer Explanation IP-Space enable From where does the router boot? When you issue the command show version, your router returns101 What is the most common mail to device? 103 104 105 106 Which statement about Ethernet switches is true? 108 109 110 111 Answer A, B, F 113 Which operation is most likely to follow? You just entered the following command115 Answer A, B, C, D What is back off on an 802.3 network? 118 Answer B, E Which command displays access list 111?120 121 122 123 124 125 126 Answer E, F, G 128 Answer A, D Explanation 130 What are the generic parts of a network layer address? What is an advantage of local area network LAN segmentation?132 133 134 135 136 How does a bridge function? 138 What are two purposes for using switches? Choose two What is an example of a valid MAC address? 141 Answers C, D Which two physical interfaces does PPP support? Choose two143 144 145 146 147 148 149 What is the purpose of ISL and 802.lq frame tagging? 151 152 Which of the following describes isdn bri servie? 154 Answer B What do you use for loop avoidance? Choose two 156 Answer B Diagram 158 Answer A, B, E Identify the effect of Ctrl-Z? 160 161 162 163 Answer a How do you change the Console password to cisco? 165 166 167 Answer C 301 Answer D Q299Answer D 302 Answer C 303Answer a 304 Answer B, C 307 Answer B 310 Answer D 309 What is the purpose of DLCIs in Frame Relay?172 173 Answer C 318 175 176 177 178 179 180 Q327 Answer Unknown 328 Answer Unknown
Related manuals
Manual 40 pages 55.56 Kb Manual 100 pages 60.16 Kb