Quiz Cisco IOS essentials

¡Supera tus tareas y exámenes ahora con Quizwiz!

SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.

How is SSH different from Telnet? SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through the use of Telnet. SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext. SSH makes connections over the network, whereas Telnet is for out-of-band access. SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a console connection.

privileged EXEC mode console interface VTY interface

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) boot IOS mode Ethernet interface privileged EXEC mode console interface router configuration mode VTY interface

This command prevents someone from viewing the running configuration passwords.

A network administrator enters the service password-encryption command into the configuration mode of a router. What does this command accomplish? This command prevents someone from viewing the running configuration passwords. This command encrypts passwords as they are transmitted across serial WAN links. This command automatically encrypts passwords in configuration files that are currently stored in NVRAM. This command enables a strong encryption algorithm for the enable secret password command. This command provides an exclusive encrypted password for external service personnel who are required to do router maintenance.

The new configuration will be loaded if the switch is restarted.

After making configuration changes on a Cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command? The configuration changes will be removed and the original configuration will be restored. The new configuration will be loaded if the switch is restarted. The new configuration will be stored in flash memory. The current IOS file will be replaced with the newly configured file.

to interrupt the ping process

An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the purpose of using these keystrokes? to restart the ping process to interrupt the ping process to exit to a different configuration mode to allow the user to complete the command

keyword

In the show running-config command, which part of the syntax is represented by running-config? a keyword the command a variablea prompt

lineconin

Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses a console connection to connect to the switch, which password is needed to access user EXEC mode? letmein secretin linevtyin lineconin

The login command is rejected by the device because no password is configured for accessing the device via the console.

Refer to the exhibit: Which of the following explains this output? The login command is rejected by the device because no password is configured for accessing the device via a remote connection. The login command is rejected by the device because no password is configured for accessing the device via the console. Longing into this device remotely has been disabled by the administrator. Longing into this device via the console has been disabled by the administrator.

SVI

Refer to the exhibit: A technician configures a switch with these commands: What is the technician configuring? physical switchport access Telnet access password encryption SVI

It is associated with VLAN1 by default. It is not associated with any physical interface on a switch. It provides a means to remotely manage a switch.

What are three characteristics of an SVI? (Choose three.) It is required to allow connectivity by any device at any location. It is associated with VLAN1 by default. It is not associated with any physical interface on a switch. It is designed as a security protocol to protect switch ports. It is a special interface that allows connectivity by different types of media. It provides a means to remotely manage a switch.

The configuration that is actively running on the device is stored in RAM. The contents of RAM are lost during a power cycle.

What are two characteristics of RAM on a Cisco device? (Choose two.) RAM is able to store multiple versions of IOS and configuration files. The configuration that is actively running on the device is stored in RAM. RAM is a component in Cisco switches but not in Cisco routers. RAM provides nonvolatile storage. The contents of RAM are lost during a power cycle.

SW1(config)#hostname

What command is used in Cisco IOS to change the name of a device? SW1#devicename SW1(config-if)#name SW1(config)#set-device-name SW1(config)#hostname

show ip interface brief

What command is used to verify the status of a Cisco's IOS device interfaces and a configured IP address? ping ipconfig show ip interface brief traceroute

(config)# service password-encryption

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? (config-line)# password secret (config)# enable password secret (config)# enable secret Secret_Password (config)# enable secret Encrypted_Password (config)# service password-encryption

It completes the remainder of a partially typed word in a command.

What function does pressing the Tab key have when entering a command in IOS? It moves the cursor to the beginning of the next line. It completes the remainder of a partially typed word in a command. It aborts the current command and returns to configuration mode. It exits configuration mode and returns to user EXEC mode.

exit

Which command or key combination allows a user to return to the previous level in the command hierarchy? end Ctrl+Z exit Ctrl+C

the switch virtual interface

Which interface allows remote management of a Layer 2 switch? the console port interface the AUX interface the first Ethernet port interface the switch virtual interface

SwBranch799 TX-5-Switch-2A4

Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.) Floor(12) Bob17 SwBranch799 MyDevice2 TX-5-Switch-2A4

Issue the reload command without saving the running configuration.

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM? Close and reopen the terminal emulation software. Issue the reload command without saving the running configuration. Delete the vlan.dat file and reboot the device. Issue the copy startup-config running-config command.


Conjuntos de estudio relacionados

David Myers, Psychology in Modules 11th Edition Exam 1

View Set

APES ENVIRONMENTAL RISK AND HAZARD

View Set

Filipino Chapter Test - 2nd Trimester

View Set

Triangle Congruence by ASA and AAS Practice

View Set

MPW Chapter 10: Designing Organization Structure

View Set

Staffing Organizations Chapters 1 - 3

View Set