free 640-802 exam demo sharing
Before installing a new, upgraded version of the IOS, what should be checked on the router, and which command should be used to gather this information? (Choose two.) A. the amount of available ROM B. the amount of available flash and RAM memory C. the version of the bootstrap software present on the router D. show version E. show processes F. show running-config Answer: BD
A network administrator is explaining VTP configuration to a new technician. What should the network administrator tell the new technician about VTP configuration? (Choose three.) A. A switch in the VTP client mode cannot update its local VLAN database. B. A trunk link must be configured between the switches to forward VTP updates. C. A switch in the VTP server mode can update a switch in the VTP transparent mode. D. A switch in the VTP transparent mode will forward updates that it receives to other switches. E. A switch in the VTP server mode only updates switches in the VTP client mode that have a higher VTP revision number. F. A switch in the VTP server mode will update switches in the VTP client mode regardless of the configured VTP domain membership. Answer: ABD
Which two locations can be configured as a source for the IOS image in the boot system command? (Choose two.) A. RAM B. NVRAM C. flash memory D. HTTP server E. TFTP server F. Telnet server Answer: CE
What are two reasons a network administrator would use CDP? (Choose two.) A. to verify the type of cable interconnecting two devices B. to determine the status of network services on a remote device C. to obtain VLAN information from directly connected switches D. to verify Layer 2 connectivity between two devices when Layer 3 fails E. to obtain the IP address of a connected device in order to telnet to the device F. to determine the status of the routing protocols between directly connected routers Answer: DE
What is the maximum data rate specified for IEEE 802.11b WLANs? A.10Mbps B.11Mbps C.54Mbps D.100Mbps Answer:B
How does using the service password-encryption command on a router provide additional security? A.by encrypting all passwords passing through the router B.by encrypting passwords in the plain text configuration file C.by requiring entry of encrypted passwords for access to the device D.by configuring an MD5 encrypted key to be used by routing protocols to validate routing exchanges E.by automatically suggesting encrypted passwords for use in configuring the router Answer:B
we will share more…just post your needs on our walls, we will share the exam you want, if u think we are good, please introduce us to your friend, share the exam, we need your support.
http://www.facebook.com/IT.Exam.Share _________________
|
 |
.Sobre mí |
Alienlife
As most of IT candidates know ourexam helped them passed the exam yet,they know using the ourexam IBM cog-400 exam dumps can help them clear the exam test.
»
Ver perfil
|
|
 |
.Calendario |
 |
Febrero 2025 |
 |
|
DO | LU | MA | MI | JU | VI | SA | | | | | | | 1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 |
|
|
|
|