[A].
[B].
[C].
[D].
Answer: Option B
Explanation:
The command service password-encryption, from global configuration mode, will encrypt the passwords.
[B].
[C].
[D].
Answer: Option B
Explanation:
The command service password-encryption, from global configuration mode, will encrypt the passwords.
[B].
[C].
[D].
Answer: Option D
Explanation:
To completely replace the running-config with the startup-config, you must reload the router. Note : You may have picked option C, which isn’t a bad answer. Remember, though, it doesn’t replace the configuration, it appends it.
[B].
[C].
[D].
Answer: Option C
Explanation:
The command show ip protocols will actually show you the broadcast address for each interface – too bad it isn’t a possible answer. Your best answer is show interfaces, which will provide the IP address and mask for each interface.
[B].
[C].
[D].
Answer: Option C
Explanation:
The exec-timeout command is set in minutes and seconds.
[B].
[C].
[D].
Answer: Option B
Explanation:
The % ambiguous command error means that there is more then one possible command that starts with ru. Use a question mark to find the correct command.
[B].
[C].
[D].
Answer: Option D
Explanation:
You can view the interface statistics from user mode, but the command is show interface serial 0/0.
[B].
[C].
[D].
Answer: Option D
Explanation:
Hubs cannot run full-duplex Ethernet. Full duplex must be used on a point-to-point connection between two devices capable of running full duplex. Switches and hosts can run full duplex between each other, but a hub can never run full duplex.
[B].
[C].
[D].
Answer: Option C
Explanation:
A reliable Transport layer connection uses acknowledgments to make sure all data is transmitted and received reliably. A reliable connection is defined by a virtual circuit that uses acknowledgments, sequencing, and flow control, which are characteristics of the Transport layer (layer 4).
[B].
[C].
[D].
Answer: Option B
Explanation:
The main advantage of a layered model is that it can allow application developers to
change aspects of a program in just one layer of the layer model’s specifications.
Advantages
of using the OSI layered model include, but are not limited to, the following:
It divides the
network communication process into smaller and simpler components, thus aiding compo-
nent development, design, and troubleshooting;
it allows multiple-vendor development
through standardization of network components;
it encourages industry standardization by
defining what functions occur at each layer of the model;
it allows various types of network
hardware and software to communicate;
and it prevents changes in one layer from affecting
other layers, so it does not hamper development.
[B].
[C].
[D].
Answer: Option A
Explanation:
No answer description available for this question.