Question 6 of 617
In which of the following conditions does the system enter ROM monitor mode? Each correct answer represents a complete solution. Choose all that apply.
Correct Answer: C, D

The system enters ROM monitor mode if the user interrupts the boot sequence or if the router does not find a valid operating system image. ROM monitor mode is used to perform diagnostic tests or to boot the device. If the router does not have a configuration file, it will enter Setup mode to create an initial configuration. Setting operating parameters is done in Privileged EXEC mode.

Question 7 of 617
Which of the following protocols is used for exchanging routing information between two gateways in a network of autonomous systems?
Correct Answer: C

Question 8 of 617
Which of the following is a 16-bit field that identifies the source port number of the application program in the host that is sending the segment?
Correct Answer: D

The Source Port Address is a 16-bit field in the TCP header that identifies the source port number of the application program in the host that is sending the segment. This field helps the receiving system know which application on the sender’s system sent the data. Other fields such as the Sequence Number, Header Length, and Acknowledgment Number have different purposes related to data sequencing, header length specification, and acknowledgment of received data, respectively.

Question 9 of 617
FILL BLANK -
Fill in the blank with the appropriate term. ______________________ is typically carried out by a remote attacker attempting to gain information or access to a network on which it is not authorized or allowed.
Correct Answer:

Question 10 of 617
FILL BLANK -
Fill in the blank with the appropriate term. The _____________is an application layer protocol that is used between workstations and routers for transporting SNA/
NetBIOS traffic over TCP sessions.
Correct Answer: