Ask Question, Ask an Expert

+1-415-315-9853

info@mywordsolution.com

Ask Computer Network & Security Expert

problem 1) Which of the following commands sets secret password to Cisco?

A. enable secret password Cisco
B. enable secret cisco
C. enable secret Cisco
D. enable password Cisco

problem 2) You type the following command into a router and receive the following output:

Router#show serial 0/0
                     ^
% Invalid input detected at '^' marker.

Why was this error message displayed?

A. You require to be in privileged mode.
B. You can’t have a space between serial and 0/0.
C. The router doesn’t have a serial0/0 interface.
D. Part of a command is missing.

problem 3) Which of the following commands will display present IP addressing and the layer 1 and 2 status of the interface?

a. show version
b. show protocols
c. show interfaces
d. show controllers
e. show ip interface

A. 1, 2 and 4
B. 2, 3 and 5
C. 3 and 4 only
D. None of the above

problem 4) You type show running-config and get this output:

[output cut]
Line console 0
      Exec-timeout 1 35
    Password BIXPASSWD
    Login
[output cut]

What do the two numbers following exec-timeout command mean?

A. If no command has been typed in 35 seconds, the console connection would be closed.
B. If no router activity has been detected in 1 hour and 35 minutes, the console would be locked out.
C. If no commands have been typed in 1 minute and 35 seconds, the console connection would be closed.
D. If you're connected to the router by a Telnet connection, input must be detected within 1 minute and 35 seconds or the connection will be closed.

problem 5) What layer of the OSI model would you suppose the problem is in if you type show interface serial 1 and receive the following message? "Serial1 is down, line protocol is down."

A. Physical layer
B. Data Link layer
C. Network layer
D. None. It is a router problem.

problem 6) Which of the following commands displays configurable parameters and statistics of all interfaces on the router?

A. show running-config
B. show startup-config
C. show interfaces
D. show versions

problem 7) Which of the following commands will configure all default VTY ports on the router?

A. Router#line vty 0 4
B. Router(config)#line vty 0 4
C. Router(config-if)#line console 0
D. Router(config)#line vty all

problem 8) You require to find broadcast address used on a LAN on your router. Which command will you type into router from user mode to find broadcast address?

A. show running-config
B. show startup-config
C. show interfaces
D. show protocols

Computer Network & Security, Computer Science

  • Category:- Computer Network & Security
  • Reference No.:- M95138

Have any Question? 


Related Questions in Computer Network & Security

A company in manhattan still keeps to the traditional

A company in Manhattan still keeps to the traditional mailing approaches even though the nature of their business strictly involves confidential documents that need to be sent to clients. Tell this Manhattan Company why ...

Assignment case study handmade furniture ltdthis case study

Assignment case study: HandMade Furniture Ltd. This case study provides background information for both assignment 1 and assignment 2. As a network consultant, your initial examination of the company has discovered the f ...

Iriss smartphone beeped frowning she glanced at the screen

Iris's smartphone beeped. Frowning, she glanced at the screen, expecting to see another junk e-mail. "We've really got to do something about the spam!" she muttered to herself. She scanned the header of the message. "Uh- ...

Assignmentall questionscarry equal weight do not change the

Assignment All Questionscarry equal weight. Do not change the order of questions. To receive full credit, show all of your work. Answers must be typed in, following APA style. Handwritten solutions will not be accepted a ...

Proposal projectchoose one of the following for this

Proposal Project Choose one of the following for this project and See attachment for complete instruction and please remember to send a turnitin report. 1) Metasploit 2) Wireshark 3) Back Track 4) Nessus 5) Cain & Abel P ...

Create a spreadsheet that takes eight values that a user

Create a spreadsheet that takes eight values that a user inputs into eight different cells. Then create a row that transposes the cells to simulate a transposition cipher, using the example transposition cipher from the ...

Assignmentinstructions1you just received a brand new

Assignment Instructions 1. You just received a brand new computer for your home environment. It comes with the latest Operating System. You also have an Internet Service Provider where you can easily use the existing net ...

Project assignment software defined networks1introductionin

Project Assignment: Software Defined Networks 1 Introduction In this assignment you will learn how to use the OpenFlow protocol to program an SDN controller in a Mininet emulated network using POX. The following sections ...

Security management assessmentimplementing basic security

Security Management Assessment Implementing basic security management is an important task for system administrators, as security is important to today's organizations. IT specialists are on the front lines of protecting ...

Current attack vectors and secure network designa friend

Current Attack Vectors and Secure Network Design A friend has recently started a business that has a large amount of intellectual property that he wants to ensure is kept secure and confidential. He plans to hire 75-100 ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

WalMart Identification of theory and critical discussion

Drawing on the prescribed text and/or relevant academic literature, produce a paper which discusses the nature of group

Section onea in an atwood machine suppose two objects of

SECTION ONE (a) In an Atwood Machine, suppose two objects of unequal mass are hung vertically over a frictionless

Part 1you work in hr for a company that operates a factory

Part 1: You work in HR for a company that operates a factory manufacturing fiberglass. There are several hundred empl

Details on advanced accounting paperthis paper is intended

DETAILS ON ADVANCED ACCOUNTING PAPER This paper is intended for students to apply the theoretical knowledge around ac

Create a provider database and related reports and queries

Create a provider database and related reports and queries to capture contact information for potential PC component pro