Computer Networking You want to totally reinitialize the router and replace the current running-config with the current startup-config. What command will you use? replace run start copy run start copy start run reload replace run start copy run start copy start run reload ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Networks where end user workstations are tied to LAN servers to share resources and application processing. Information super highway Business applications of telecommunications Internetworked enterprise Client/Server networks Information super highway Business applications of telecommunications Internetworked enterprise Client/Server networks ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following would be a good starting point for troubleshooting if your router is not translating? Check your interfaces for the correct configuration. Run the debug all command. Call Cisco. Reboot. Check your interfaces for the correct configuration. Run the debug all command. Call Cisco. Reboot. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following commands will configure all the default VTY ports on a router? Router (config) #line vty 0 4 Router (config) #line vty all Router#line vty 0 4 Router (config-if) #line console 0 Router (config) #line vty 0 4 Router (config) #line vty all Router#line vty 0 4 Router (config-if) #line console 0 ANSWER DOWNLOAD EXAMIANS APP
Computer Networking What is the main reason the OSI model was created? So application developers can change only one layer's protocols at a time. So different networks could communicate. To create a layered model larger than the DoD model. So Cisco could use the model. So application developers can change only one layer's protocols at a time. So different networks could communicate. To create a layered model larger than the DoD model. So Cisco could use the model. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking You need to allow one host to be permitted to attach dynamically to each switch interface. Which two commands must you configure on your catalyst switch to meet this policy?1. Switch (config-if) # ip access-group 102. Switch (config-if) # switchport port-security maximum 13. Switch (config) # access-list 10 permit ip host 14. Switch (config-if) # switchport port-security violation shutdown5. Switch (config) # mac-address-table secure 2, 3 and 5 2 and 4 4 and 5 1 and 3 2, 3 and 5 2 and 4 4 and 5 1 and 3 ANSWER DOWNLOAD EXAMIANS APP