A. Erase flash.
B. Restart the switch.
C. Delete the VLAN database.
D. Erase the running configuration.
E. Erase the startup configuration.
F. Modify the configuration register.
您可能感興趣的試卷
你可能感興趣的試題
A.ARP
B.CDP
C.DHCP
D.DNS
E.ICMP
A. The switch will ignore VTP summary advertisements.
B. The switch will forward VTP summary advertisements.
C. The switch will process VTP summary advertisements.
D. The switch will originate VTP summary advertisements.
E. The switch will create, modify and delete VLANs for the entire VTP domain.
A. to make VTP easier to implement
B. to isolate broadcast traffic
C. to increase the size of the collision domain
D. to allow more devices to connect to the network
E. to logically group hosts according to function
F. to increase network security
A.172.25.78.243
B.172.25.98.16
C.172.25.72.0
D.172.25.94.255
E.172.25.96.17
F.172.25.100.16
A. transparent
B. auto
C. on
D. desirable
E. client
F. forwarding
A. Make sure that the server can be reached across the network.
B. Check that authentication for TFTP access to the server is set.
C. Assure that the network server has adequate space for the IOS image.
D. Verify file naming and path requirements.
E. Make sure that the server can store binary files.
F. Adjust the TCP window size to speed up the transfer.
A. Switch1(config-if)# switchport port-security maximum 1
B. Switch1(config)# mac-address-table secure
C. Switch1(config)# access-list 10 permit ip host
D. Switch1(config-if)# switchport p ort-security violation shutdown
E. Switch1(config-if)# ip access-group 10
A. addresses chosen by a company to communicate with the Internet
B. addresses that cannot be routed through the public Internet
C. addresses that can be routed through the public Internet
D. a scheme to conserve public addresses
E. addresses licensed to enterprises or ISPs by an Internet registry organization
A. A successor route is used by EIGRP to forward traffic to a destination.
B. Successor routes are saved in the topology table to be used if the primary route fails.
C. Successor routes are flagged as "active" in the routing table.
D. A successor route may be backed up by a feasible successor route.
E. Successor routes are stored in the neighbor table following the discovery process.
Which routing protocols can be used within the enterprise network shown in the diagram?()
A.RIP v1
B.RIP v2
C.IGRP
D.OSPF
E.BGP
F.EIGRP
最新試題
A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()
While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()
When you are troubleshooting an ACL issue on a router,which command can help you to verify which interfaces are affected by the ACL?()
Which statement describes the rule of split horizon?()
Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()
Which protocol reduces administrative overhead in a switched network by allowing the configuration of a new VLAN to be distributed to all the switches in a domain?()
Which command encrypts all plaintext passwords?()
You have been asked to come up with a subnet mask that will allow all three web servers to be on the same network while providing the max number of subnets.Which network address and subnet mask meet this requirement?()
What is the result of issuing the frame-relay map ip 192.168.1.2 202 broadcast command?()
After the show ip route command has been entered,the follwing routes are displayed.Which route will not be entered into the routing table of a neighboring router?()