A.It checks the configuration register.
B.It attempts to boot from a TFTP server.
C.It loads the first image file in flash memory.
D.It inspects the configuration file in NVRAM for boot instructions.
您可能感兴趣的试卷
你可能感兴趣的试题
A.packet switching
B.access layer security
C.path selection
D.VLAN membership assignment
E.bridging between LAN segments
F.microsegmentation of broadcast domains
A.session
B.transport
C.network
D.data link
E.physical
A.protocol
B.VLAN number
C.TCP or UDP port numbers
D.source switch port number
E.source IP address and destination IP address
F.source MAC address and destination MAC address
A.BSS
B.ESS
C.IBSS
D.SSID
A.Because of damaged flash memory, the router will fail the POST
B.It will attempt to locate the IOS from a TFTP server. If this fails, it will initiate the setup dialog.
C.It will attempt to locate the IOS from a TFTP server. If this fails, it will load a limited IOS from ROM
D.It will attempt to locate the configuration file from a TFTP server. If this fails, it will initiate the setup dialog.
E.It will attempt to locate the configuration file from a TFTP server. If this fails, it will load a limited configuration from ROM
A.the summarized address for all of the internal subnetted addresses
B.the MAC address of the router used by inside hosts to connect to the Internet
C.a globally unique, private IP address assigned to a host on the inside network
D.a registered address that represents an inside host to an outside network
A.VTP allows routing between VLANs.
B.VTP allows a single port to carry information to more than one VLAN
C.VTP allows physically redundant links while preventing switching loops.
D.VTP allows switches to share VLAN configuration information.
A.point-to-point and multiaccess
B.point-to-multipoint and multiaccess
C.point-to-point and point-to-multipoint
D.nonbroadcast and broadcast multipoint
E.nonbroadcast and broadcast multiaccess
A.to prevent unauthorized Telnet access to a switch port
B.to limit the number of Layer 2 broadcasts on a particular switch port
C.to prevent unauthorized hosts from accessing the LAN
D.to protect the IP and MAC address of the switch and associated ports
E.to block unauthorized access to the switch management interfaces over common TCP ports
A.permit all packets matching the first three octets of the source address to all destinations
B.permit all packets matching the last octet of the destination address and accept all source addresses
C.permit all packets from the third subnet of the network address to all destinations
D.permit all packets matching the host bits in the source address to all destinations
E.permit all packets to destinations matching the first three octets in the destination address
最新试题
An employee of ABC company has move to an office on a different floor. Although the administrator is able to telnet to all of the routers,the address of Switch F is needed in order to verify that the employee remains in the same VLAN.Which action could be used by the administrator to find the IP address of Switch F?()
Which address is the IPV6 all-RIP-routers muticast group address that is used by RIPng as the destaion address?()
Which command displays the CHAP authentication process as it occurs between two routers?()
While troubleshooting a network problem,a technician discovers that the current copy of the Cisco IOS is outdated and needs to be updated.Which of the following commands would the technician issue to replace the Cisco router IOS with the newer version?()
Three switches are connected to one anther via trunk ports.Assuming the default switch configuration,which switch is elected as the root bridge for the spanning-tree instance of vlan 1?()
Which statement describes the rule of split horizon?()
At which layer of the OSI model is RSTP used to prevent loops?()
Which pairing reflects a correct protocol-and-metric relationship?()
A network administrator is planning a network installation for a large organization.The design requires 100 separate subnetworks,so the company has acquired a Class B network address.What subnet mask will provide the 100 subnetworks required, if 500 usable host addresses are required per subnet?()
Which name describes an IPV6 host-enable tunneling technique that uses IPV4 UDP,does not require dedicated gateway tunnels,and can pass through existing IPV4 NAT gateways?()