A.Boot to a password recovery window
B.Boot with the factory default image
C.Erase the system configuration and boot with the factory default IOS image
D.Erase the system configuration and boot from a TFTP-supplied IOS image
E.Erase the System Configuration
您可能感興趣的試卷
你可能感興趣的試題
A.Cisco 2821
B.Cisco 2811
C.Cisco 3845
D.Cisco 2801
E.Cisco 2851
F.Cisco 3825
A.IPSec VPN
B.QoS mechanism
C.Firewall
D.NAT
E.EIGRP routing protocol
F.Static routing
You work as a network technician at Certkiller .com. Please study the exhibit carefully. All of the computing devices shown are on the same logical network, as if they were all connected to the same switch. Which two features make this possible?()
A.PAT
B.802.1Q
C.Spanning-tree
D.VLANs
E.QoS
最新試題
Which statements about 802.1Q trunking in Secure Network Foundation Design Guide for Single Site Deployments are correct?()
What is the reason for running spanning-tree in a Cisco Single-Site Secure Network Foundation Solution?()
During which phase of the steps to success methodology for Cisco SMB Security Solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which,if any modification should be prior to implementation?()
Which WAN connection requires a different interface than the standard interface provided in the Cisco Single-Site Secure Network Foundation deployment design?()
Please study the exhibit.What are two options available when using the Security Audit Configuration task in Cisco SDM?()
In an environment in which multiple VLANs have been defined on Catalyst Express 500 switches, which two statements are correct for ports that have been configured with the Smartport role of "IP Phone + Desktop"?()
You work as a network technician at Certkiller .com. Please study the exhibit carefully. Which Cisco SDM Configuration task would you use to enable access and inspection rules on the WAN interface, preventing any external traffic from entering the network unless that traffic is a reply to a session that originated in the internal network?()
You are designing a solution that needs to support 40 IP phone users. Which routers model does the Cisco Single-Site Secure Network Foundation 1.1 Designing and Implementation Guide suggest for this Solution?()
When determining a customer’s technical requirements for a Cisco Unified Communications solution, which important tool can be used to determine the bandwidth used by different codecs with various protocols over different media?()
During which phase of the steps to success methodology for Cisco SMB security solutions would the Network Readiness Assessment be used to assess the readiness of an existing network infrastructure and determine which, if any, modification should be made prior to implementation?()