Home

Extended traceroute works from which mode?

A. User EXEC

B. Privilege EXEC

C. Configuration

D. User and Privilege EXEC

Please do not use chat terms. Example: avoid using "grt" instead of "great".

You can do it
  1. When choosing a WAN solution, consider all of the following except __________.
  2. Which command takes you from Privilege EXEC mode to User EXEC mode?
  3. A ___________ is similar to a telephone circuit-switched connection.
  4. The OSPF process ID is __________.
  5. You are given a Class B network with a subnet mask of 255.255.255.192. How many hostaddresses are there…
  6. OSPF supports a ________-layer hierarchical design.
  7. The TCP/IP protocol stack has ________ layers.
  8. You are given a Class C network with 25 bits of networking. How many subnets do you have?
  9. Which of the following is true concerning bridges?
  10. ________ topologies in NBMA environments do not have problems with split horizon.
  11. A Class A address has _________ host bits.
  12. When configuring your terminal emulation software for a console connection, set the flow control to…
  13. When a carrier experiences congestion, it marks the _______ bit in the header of the Frame Relay frame.
  14. Extended IP ACLs should be placed as close to the ____________ device as possible.
  15. Which 2950 command assigns a VLAN to an interface?
  16. IGRP generates an update every ___________ seconds.
  17. What command activates the IP routing process?
  18. Choose the following that a standard IP ACL can match on.
  19. VLSM allows you to summarize __________ back to the class boundary.
  20. Which type of traffic is sent to a group of devices?
  21. The root switch is the one elected with the __________ __________.
  22. If the port status LED on a 2950 is ________, there is a physical layer connection problem.
  23. On the 1900 switch, how do you enter User EXEC mode?
  24. Which router command would take you back to a suspended telnet session?
  25. A _________ provides a high-speed infrastructure to move data between storage devices and file servers.
  26. A __________ topology uses a single connection to connect all devices together.
  27. A _________ is a network that provides a secure connection from a company to other business partners.
  28. Which of the following is not an advantage of DHCP?
  29. When choosing a dynamic routing protocol, which of the following should not be considered?
  30. With a rollover cable, pin 7 on one end is mapped to pin ________ on the other end.