40 questions
A router boots and enters setup mode. What is the reason for this?
The IOS image is corrupt.
Cisco IOS is missing from ash memory.
The configuration file is missing from
NVRAM.
The POST process has detected hardware
failure.
Which command is used to encrypt all
passwords in a router configuration file?
Router_A (config) # enable secret <password>
Router_A (config) # service password-encryption
Router_A (config) # enable password <password>
Router_A (config) # encrypt password
Company policy requires using the most secure method to safeguard access to the privileged exec and configuration mode on the routers. The privileged exec password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security?
secret password trustknow1
enable password trustknow1
service password-encryption
enable secret trustknow1
What will be the response from the router after the command, "router(config)# hostname portsmouth" is entered?
portsmouth#
portsmouth(config)#
router(config-host)#
invalid input detected
Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status?
show ip interface brief
ping
show ip route
show interface fa0/1
Which command can be used on a Cisco router to display all interfaces, the IPv4 address assigned, and the current status?
show ip interface brief
ping
show ip route
show interface fa0/1
Which CLI mode allows users to access all device commands, such as those used for configuration, management, and troubleshooting?
user EXEC mode
privileged EXEC mode
global configuration mode
interface configuration mode
What is the purpose of the startup configuration file on a Cisco router?
to facilitate the basic operation of the hardware components of a device
to contain the commands that are used to initially configure a router on startup
to contain the configuration commands that the router IOS is currently using
to provide a limited backup version of the IOS, in case the router cannot load the full featured IOS
Which characteristic describes the default gateway of a host computer?
the logical address of the router interface on the same network as the host computer
the physical address of the switch interface connected to the host computer
the physical address of the router interface on the same network as the host computer
the logical address assigned to the switch interface connected to the router
What is the purpose of the banner motd command?
It configures a message that will identify printed documents to LAN users.
It is a way that routers communicate the status of their links with one another.
It provides an easy way of communicating with any user attached to a router's LANs.
It provides a way to make announcements to those who log in to a router.
A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered to do this
task?
user executive mode
global configuration mode
any line configuration mode
privileged EXEC mode
What is stored in the NVRAM of a Cisco router?
the Cisco IOS
the running configuration
the bootup instructions
the startup configuration
Which statement regarding the service password-encryption command is true?
It is configured in privileged EXEC mode.
It encrypts only line mode passwords.
As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted.
To see the passwords encrypted by the service password-encryption command in plain text, issue the no service password-encryption command.
What will be the prompt after executing the following command?
Switch(config)# line console 0
Correct answer is missing
(config-line)#
Switch(config)#
Switch(line-config)#
Switch(config-line)#
show ip interface brief is a command that allows you to view and to verify the condition of the switch or router interfaces.
True
False
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
VTY interface
Console interface
Ehernet interface
privileged exec mode
router config mode
What function does pressing the Tab key have when entering a command in IOS?
It aborts the current command and returns to configuration mode.
It exits configuration mode and returns to user EXEC mode.
It moves the cursor to the beginning of the next line.
It completes the remainder of a partially typed word in a command.
Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode?
letmein
secretin
lineconin
linevtyin
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
telnet
SVI
password encryption
physical switchport access
How is SSH different from Telnet?
SSH makes connections over the network, whereas Telnet is for out-of-band access.
SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.
SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through the use of Telnet.
SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a console connection.
A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so that patients can see the medical records data of other patients. Which of the four network characteristics has been violated in this situation?
fault tolerance
scalability
security
Quality of Service (QoS)
reliability
What two criteria are used to help select a network medium from various network media? (Choose two.)
the types of data that need to be prioritized
the cost of the end devices utilized in the network
the distance the selected medium can successfully carry a signal
the number of intermediate devices installed in the network
the environment where the selected medium is to be installed
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
VTY interfac
console interface
ethernet interface
boot IOS mode
router configuration mode
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
Issue the reload command without saving the running configuration
Delete the vlan.dat file and reboot the device.
Close and reopen the terminal emulation software.
Issue the copy startup-config running-config command.
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
Telnet Access
SVI
Password Encryption
physical switchport access
Which command or key combination allows a user to return to the previous level in the command hierarchy?
end exit Ctrl-Z Ctrl-C
end
Ctrl-Z
Ctrl-C
exit
What are two characteristics of RAM on a Cisco device? (Choose two.)
RAM provides nonvolatile storage.
The configuration that is actively running on the device is stored in RAM.
The contents of RAM are lost during a power cycle.
RAM is a component in Cisco switches but not in Cisco routers.
RAM is able to store multiple versions of IOS and configuration files.
Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)
Branch2!
RM-3-Switch-2A4
Floor(15)
HO Floor 17
SwBranch799
How is SSH different from Telnet?
SSH makes connections over the network, whereas Telnet is for out-of-band access.
SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.
SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through the use of Telnet.
SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a console connection.
Refer to the exhibit. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?
to display a message when a user accesses the switch
to configure switch SW1 so that only the users in the Admin group can telnet into SW1
to force users of the Admin group to enter a password for authentication
to configure switch SW1 so that the message will display when a user enters the enable command
Which interface is the default SVI on a Cisco switch?
FastEthernet 0/1
GigabitEthernet 0/1
VLAN 99
VLAN 1
192.168.1.24 /27
Network ID
First host
Last Host
Broadcast
Next Network
Refer to the exhibit. A network technician is testing connectivity in a new network. Based on the test results shown in the exhibit, which device does the technician have connectivity with and which device does the technician not have connectivity with? (Choose two.)
connectivity: switch 2
connectivity: PC-D
connectivity: PC-B
no connectivity: PC-C
no connectivity: switch 1
Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)
Two physical interfaces have been configured.
The switch can be remotely managed
One device is attached to a physical interface
Passwords have been configured on the switch.
The default SVI has been changed
Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same network can ping this gateway. What is a possible reason for this?
The VLAN IP address and the default gateway IP address are not in the same network.
The local DNS server is not functioning correctly.
The ip default-gateway command has to be issued in the VLAN interface configuration mode.
The default gateway address must be 192.168.10.1.
The no shutdown command was not issued for vlan 1