Network
Which command or key combination allows a user to return to the previous level in the command hierarchy?
exit
The operating system on home routers is usually called __________.
firmware
The portion that interfaces with applications and the user is known as the __________.
shell
By connecting two PCs to a __________, those PCs will instantly have connectivity with one another.
switch
Completes abbreviated commands and parameters
tab
There are a number of excellent __________ available for connecting to a networking device either by a serial connection over a console port or by a SSH/Telnet connection.
terminal emulation programs
Refer to the exhibit. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?
to display a message when a user accesses the switch
Provides context sensitive help
?
What is a result of using the service password-encryption command on a Cisco network device?
All passwords in the configuration are not shown in clear text when viewing the configuration.
The __________ is less resource intensive and very stable when compared to a __________.
CLI; GUI
This is a physical management port that provides out-of-band access to a Cisco device.
Console
Aborts commands such as trace and ping
Ctrl-Shift-6
What criterion must be followed in the design of an IPv4 addressing scheme for end devices?
Each IP address must be unique within the local network.
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
Exit privileged EXEC mode and press Enter.
Which two features are characteristics of flash memory?
Flash provides nonvolatile storage; The contents of flash may be overwritten
What benefit does DHCP provide to a network?
Hosts can connect to the network and get an IP address without manual configuration.
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
Issue the reload command without saving the running configuration.
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified.
virtual interface
It allows access throught use of Telnet or SSH protocols; It requires an active network connection.
AUX port
It connects through dialup connections; It is not supported on Catalyst switch devices
console port
It displays startup, debugging, and error messages by default; It can be used to restore an out-of-box configuration on a switch or router
How does the service password-encryption command enhance password security on Cisco routers and switches?
It encrypts passwords that are stored in router or switch configuration files.
Which two characters are allowed as part of the hostname of a Cisco device?
Numbers and dashes
__________ refers to access via a dedicated management channel that is used for device maintenance purposes only.
Out-of-band access
Higher configuration modes, like global configuration mode, can only be reached from this mode.
Privileged EXEC Mode
This mode can be identified by the prompt ending with the # symbol (Switch# Router#).
Privileged EXEC Mode
To execute configuration commands, a network administrator must access this mode.
Privileged EXEC Mode
An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.)
Privileged EXEC Mode- Second Mode Line Configuration Mode- Final Mode Global Configuration Mode- Third Mode User EXEC Mode- First Mode
Some of terminal emulation programs include:
PuTTY; Tera Term; SecureCRT; OS X Terminal
Which two host names follow the guidelines for naming conventions on Cisco IOS devices?
RM-3-Switch-2A4 and SwBranch799
Unlike __________, __________ does not provide a securely encrypted connection. User authentication, passwords, and commands are sent over the network in plaintext.
SSH; Telnet
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
Secure Shell (SSH)
__________ is a method for remotely establishing a secure CLI connection through a virtual interface, over a network.
Secure shell (SSH)
Displays the next screen
Space bar
_________ is an insecure method of remotely establishing a CLI session through a virtual interface, over a network.
Telnet
__________ allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes.
Terminal emulation programs
A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration?
The PC was preconfigured to use DHCP.
What are two characteristics of RAM on a Cisco device?
The configuration that is actively running on the device is stored in RAM; The contents of RAM are lost during a power cycle.
Which information does the show startup-config command display?
The contents of the saved configuration file in NVRAM
What is the function of the kernel of an operating software?
The kernel provisions hardware resources to meet software requirements.
Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same network can ping this gateway. What is a possible reason for this?
The no shutdown command was not issued for VLAN 1.
Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command?
The switch can be remotely managed; One device is attached to a physical interface; The default SVI has been configured.
Which interface allows remote management of a Layer 2 switch?
The switch virtual interface
Why would a Layer 2 switch need an IP address?
To enable the switch to be managed remotely
Why is it important to configure a hostname on a device?
To identify the device during remote access (Telnet/SSH)
Scrolls backwards through previously entered commands
Up arrow
A CLI-based network operating system like the Cisco IOS on a switch or router enables a network technician to:
Use a keyboard to run CLI-based network programs; Use a keyboard to enter text and text-based commands; View output on a monitor
Through a GUI, a PC operating system enables a user to:
Use a mouse to make selections and run programs; Enter text and text-based commands; View output on a monitor
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
Use the console port to locally access the switch from a serial or USB interface of the PC
A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?
User EXEC Mode
A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?
User EXEC Mode
This mode allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device.
User EXEC Mode
This mode has limited capabilities but is useful for basic operations.
User EXEC Mode
This mode is identified by the CLI prompt that ends with the > symbol (Switch> Router>).
User EXEC Mode
As a security feature, the Cisco IOS software separates management access into the following two primary command modes:
User EXEC Mode; Privileged EXEC Mode
Which interface is the default SVI on a Cisco switch?
VLAN 1
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
VTY interface; console interface; privileged EXEC mode
A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade?
What models of routers and switches require upgrades? Do the routers and switches have enough RAM and flash memory for the proposed IOS versions? What features are required for the devices?
The user can interact with the shell using a __________ or a __________.
command-line interface (CLI); graphical user interface (GUI)
Even though a Cisco switch will function immediately, __________ is a recommended best practice.
configuring initial settings
Refer to the exhibit. A network technician is testing connectivity in a new network. Based on the test results shown in the exhibit, which device does the technician have connectivity with and which device does the technician not have connectivity with?
connectivity: switch 2; no connectivity: PC-C
To initially configure a Cisco device, a __________ must be established.
console connection
There are several ways to access the CLI environment and configure the Cisco switch. The most common methods are:
console, secure shell (SSH), and telnet
Unlike a __________ connection, __________ connections require active networking services on the device including an active interface configured with an address.
console; SSH
A network operating system enables __________ to function and provides a(n) __________ for users to interact.
device hardware; interface
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?
displaying a list of all available commands within the current mode; determining which option, keyword, or argument is available for the entered command
The Cisco IOS modes use a __________ and are quite similar for both switches and routers.
hierarchical structure
What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?
if there is connectivity with the destination device
What command can be used on a Windows PC to see the IP configuration of that computer?
ipconfig
The portion of the OS that interacts directly with computer hardware is known as the __________.
kernel
Some devices, such as routers, may also support a __________ that was used to establish a CLI session remotely using a modem. Similar to a console connection, the __________ is out-of-band and does not require networking services to be configured or available.
legacy auxiliary port; AUX port
These network devices use an operating system called a __________.
network operating system
Every computer requires a(n) __________ to function, including computer-based network devices such as switches, routers, access points, and firewalls.
operating system
Once consoled in, the network technician will have to navigate through __________.
various command modes of the IOS CLI