Which of the following commands should immediately follow interface vlan 1 when configuring IPv4 on a switch?

A) ip address ip-address mask
B) no shutdown
C) ip default-gateway ip-address
D) ip name-server ip-address1 ip-address2 …


A
Explanation: A) The IP address and mask need to be established first, so the command ip address ip-address mask should be used next.

Computer Science & Information Technology

You might also like to view...

Which of the following statements is false?

a. If several synchronized statements in different threads are trying to execute on an object at the same time, only one of them may be active on the object—all the other threads attempting to enter a synchronized statement on the same object are placed in the blocked state. b. When a synchronized statement finishes executing, the object’s monitor lock is released and one of the blocked threads attempting to enter a synchronized statement can be allowed to acquire the lock to proceed. c. Java also allows synchronized methods. Before executing, a synchronized instance method must acquire the lock on the object that’s used to call the method. d. Using a synchronized block to enforce mutual exclusion is an example of the design pattern known as the Java Exclusion Pattern.

Computer Science & Information Technology

Assume that you are an employee of a consultancy company that specializes in the analysis, design, and implementation of database systems. A client has recently approached your company with a view to implementing a database system. Task: You are required to establish the database project through the early stages of the project. With this task in mind, create a mission statement and mission objectives and high- level systems diagram for the client’s database system.

What will be an ideal response?

Computer Science & Information Technology

The study of human factors related to things people use.

A. RSI B. headgear C. ergonomics D. technical study

Computer Science & Information Technology

The _____ is directed at Web sites catering to children and requires Web site owners to obtain parental consent before they collect any personal information from children under 13 years old.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology