The command ____ copies the configuration from the TFTP server to the startup configuration.

A. copy run start
B. copy tftp running-config
C. copy tftp startup-config
D. copy start run


Answer: C

Computer Science & Information Technology

You might also like to view...

________ is a malicious attack directed at a person who has access to sensitive data, such as PHI

a. Social engineering b. Phishing c. Spamming d. None of the above

Computer Science & Information Technology

The Windows 8.1 . Windows Update type that might include software, driver updates, language packs is called Update roll-ups

Indicate whether the statement is true or false

Computer Science & Information Technology

Identify the three top computer forensic certifications.

What will be an ideal response?

Computer Science & Information Technology

The growth and importance of data warehousing has led to another type of database model-the ______________________________.

Fill in the blank(s) with the appropriate word(s).

Computer Science & Information Technology