單項選擇題Which command is used to copy the configuration from RAM into NVRAM?()

A. copy running-config startup-config
B. copy startup-config: running-config
C. copy running config startup config
D. copy startup config running config
E. write terminal


您可能感興趣的試卷

你可能感興趣的試題

2.多項選擇題The network administrator of the Oregon router adds the follwing command to the router configuration: ip route 192.168.12.0 255.255.255.0 172.16.12.1. What are the results of adding this command?()

A. The command establishes a static route
B. The command invokes a dynamic routing protocol for 192.168.12.0
C. Traffic for network 192.168.12.0 is forwarded to 172.16.12.1
D. Traffic for all networks is forwarded to 172.16.12.1
E. This route is automatically propagated throughout the entire network
F. Traffic for network 172.16.12.0 is forwarded to the 192.168.12.0 network

3.多項選擇題The OSPF hello protocol performs which of the following tasks?()

A. It provides dynamic neighbor discovery
B. It detects unreachable neighbors in 90 second intervals
C. It maintains neighbor relationships
D. It negotiates correctness parameters between neighboring interfaces
E. It uses timers to elect the router witch the fastest links as the designated router
F. It broadcasts hello packets throughout the internetwork to discover all routers that are running OSPF

4.多項選擇題Which of the following describe private IP addresses?()

A.addresseschosenbyacompanytocommunicatewiththeInternet
B.addressesthatcannotberoutedthroughthepublicInternet
C.addressesthatcanberoutedthroughthepublicInternet
D.aschemetoconservepublicaddresses
E.addresseslicensedtoenterprisesorISPsbyanInternetregistryorganization


5.多項選擇題Which three statements about VTP features are true?()

A. When properly configured,VTP minimizes VLAN misconfigurations and configuration inconsistencies
B. Each broadcast domain on a switch can have its own unique VTP domain
C. VTP works at Layer 3 of the OSI model and requires that a management VLAN IP address be configured.
D. When properly configured,VTP maintains VLAN configuration consistency and accelerates trunk link negotiation.
E. VTP pruning is used to increase available bandwidth in trunk links
F. Client,server,and transparent are valid VTP modes
G. To configure a switch to be part of two VTP domains,each domain must have its own passwords

6.多項選擇題Two switches are connected through a trunk link.which two commands show that there is a native VLAN mismatch on that link?()

A. show interfaces interface
B. show vlan bri
C. show interfaces interface switchport
D. show interface interface trunk
E. show interfaces vlan

7.多項選擇題Which three are characteristics of an IPV6 anycast address?()

A. any-to-many communication model
B. delivery of packets to the group interface that is closest to the sending device
C. one-to-many communication model
D. the same address for multiple devices in the group
E. one-to-nearest communication model
F. a unique IPV6 address for each device in the group

8.多項選擇題Which two data intergrity algorithms are commonly used in VPN solutions?()

A.HMAC-MD5
B.RSA
C.HMAC-SHA-1
D.DH1
E.DH2

9.多項選擇題Which are three reasons that an organization with multiple branch offices and roaming users might implement a Cisco VPN solution instead of point-to-point WAN links?()

A.reduced cost
B.bette rthroughput
C.increased security
D.scalability
E.reduced latency
F.broadband incompatibility

10.多項選擇題Which three statements about EIGRP are true?()

A. EIGRP converges fast RIP because of DUAL and backup routes that are stored in the topology table.
B. EIGRP uses a hello protocol to establish neighbor relationships
C. EIGRP uses split horizon and reverse poisoning to avoid routing loops.
D. EIGRP uses periodic updates to exchange routing information
E. EIGRP allows routers of different manufacturers to interoperate
F. EIGRP supports VLSM and authentication for routing updates.
G. EIGRP use a broadcast address to send routing information.

最新試題

How are VTP advertisements delivered to switches across the network?()

題型:單項選擇題

A router receives information about network 192.168.10.0/24 from multiple sources.What will the router consider the most reliable information about the path to that network?()

題型:單項選擇題

Which cisco ios command can help to determine the timing of various debug events,relative to each other,when you are debugging a complicated router issue?()

題型:單項選擇題

Which IPsec security protocol should be used when confidentiality is required?()

題型:單項選擇題

What is the subnetwork address for a host with the IP address 201.100.5.68/28?()

題型:單項選擇題

Three access ports have been installed and configured to a small office.What term defines the wireless topology?()

題型:單項選擇題

Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()

題型:單項選擇題

Which device might be installed at a branch office to enable and manage an IPsec site-to-site VPN?()

題型:單項選擇題

Which pairing reflects a correct protocol-and-metric relationship?()

題型:單項選擇題

While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()

題型:單項選擇題