IST 202 Test 2

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which two statements are true about NTP servers in an enterprise network?

- NTP servers at stratum 1 are directly connected to an authoritative time source - NTP servers ensure an accurate time stamp on logging and debugging information

A production switch is reloaded and finishes with a "Switch>" prompt. What two factors can be determined?

- a full version of the Cisco IOS was located and loaded - POST occurred normally this prompt occurs after a switch boots normally but does not have or can't locate startup file

Which three statements accurately describe VLAN types?

- after the initial boot of an unconfigured switch, all ports are members of the default VLAN - an 802.1Q trunk port, with a native VLAN assigned, supports both tagged and untagged traffic

What are two primary benefits of using VLANS?

- cost reduction - improved IT staff efficiency

Which two statements are true regarding switch port security?

- dynamically learned secure MAC addresses are lost when the switch reboots -if fewer than the maximum number of MAC addresses for a port are configured statically, dynamically learned addresses are added to CAM until the maximum number is reached

A network administrator wants to configure a router so that only a specific interface will send and receive CDP information. Which two configuration steps accomplish this?

- no cdp run - cdp enable

Which two characteristics match extended range VLANS?

- they are saved in the running-config file by default - VLAN IDs exist between 1006 & 4094

Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server?

- verify connectivity between the router and TFTP server using the "ping" command - verify that there is enough flash memory for the new Cisco IOS image using the "show flash" command

In the IOS image named c1900-univeralk9-mz.SPA.152-3.T.bin, which part identifies the major release number?

15

How long is the evaluation license period for Cisco IOS Release 15.0 software packages?

60 days

Which two modes does Cisco recommend when configuring a particular switch port?

Access Trunk

What is the difference between CDP and LLDP?

CDP is a proprietary protocol, whereas LLDP is a vendor-neutral protocol

Which syslog message type is accessible only to an administrator and only via the Cisco CLI?

Debugging

What can a network administrator do to access a router if the password has been lost?

From ROMMON mode, configure the router to ignore the startup configuration when the router initializes

Beginning with the Cisco IOS Software Release 15.0, which license is a prerequisite for installing additional technology pack licenses?

IPBase

When logging is used, which severity level indicates that a device is unusable?

Level 0 - emergency

A network administrator configures the port-security feature on a switch. The security policy specifies that each access port should allow up to two MAC addresses. When the maximum number of MAC addresses is reached, a frame with an unknown source MAC address is dropped and a notification is sent to the syslog sever. Which security violation mode should be configured for each access port?

Restrict

Which protocol or service allows network administrators to receive system messages that are provided by network devices?

Syslog

What is one difference between using Telnet or SSH to connect to a network device for management purposes?

Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

Which interface is the default location that would contain the IP address used to manage a 24-port Ethernet switch?

VLAN 1

Which type of VLAN is used to designate which traffic untagged when crossing a trunk port?

a native VLAN

What VLANs are allowed across a trunk when the range of allowed VLAN's is set to the default value?

all VLANs will be allowed across the trunk

An administrator has determined that the traffic from a switch that corresponds to a VLAN is not being received on another switch over a trunk link. What could be the problem?

allowed VLANs on trunks

A network technician is attempting a password recovery on a router. From ROM-MON mode, which command must be entered to bypass the startup-configuration file?

confreg 0x2142

Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?

console

An administrator issues the command "confreg 0x2142" at the rommon 1> prompt. What is the effect when this router is rebooted?

contents in NVRAM will be ignored

A Cisco Catalyst switch has been added to support the use of multiple VLANS as part of an enterprise network. The network technician finds it necessary to clear all VLAN information from the switch to incorporate a new network design. What should the technician do to accomplish this task?

delete the startup configuration file and the vlan.dat file in the flash memory of the switch and reboot the switch

What must the network administrator do to remove Fast Ethernet port Fa0/1 from VLAN 2 and assign it to VLAN 3?

enter the "switchport access vlan 3" command in interface configuration mode

Which two statements are true about using full-duplex Fast Ethernet?

full-duplex fast Ethernet offers 100 percent efficiency in both directions performance is improved with bidirectional flow of data

Which statement describes the port speed LED on the Cisco Catalyst 2960 switch?

if the LED is green, the port is operating at 100 Mb/s

Which action will bring an error-disabled switchport back to an operational state?

issue the "shutdown" then "no shutdown" interface commands

A Cisco switch currently allows traffic tagged with VLANs 10 and 20 across trunk port Fa0/5. What is the effect of issuing a "switchport trunk allowed vlan 30" command Fa0/5?

it allows only VLAN 30 on Fa0/5

What statement describes a Cisco IOS image with the "universalk9_npe" designation for Cisco ISR G2 routers?

it is an IOS version that, at the request of some countries, removes any strong cryptographic functionality

Which command is used to configure a one-time acceptance of the EULA for all Cisco IOS software packages and features?

license save

What are the most common syslog messages?

link up and link down messages

Which option correctly enables LLDP on an interface?

lldp receive lldp transmit

What is the configuration command to globally enable LLDP on a Cisco Catalyst switch?

lldp run

What must an administrator have in order to reset a lost password on a router?

physical access to the router

A network engineer is upgrading to the Cisco IOS image on a 2900 series ISR. What command could the engineer use to verify the total amount of flash memory as well as how much flash memory is currently available?

show flash0:

Which command displays the encapsulation type, the voice VLAN ID, and the access mode VLAN for the Fa0/1 interface?

show interfaces Fa0/1 switchport

A network technician is troubleshooting problems with a router that is running IOS 15.Which command displays the features activated for the licenses that are installed on the router?

show license

The command ntp server 10.1.1.1 is issued on a router. What impact does this command have?

synchronizes the clock of the router with the timeserver at IP address 10.1.1.1

What information can be gathered about a neighbor device from the "show cdp neighbors detail" command that cannot be found with the "show cdp neighbors" command?

the IP address of the neighbor

What happens to switch ports after the VLAN to which they are assigned is deleted?

the ports stop communicating with the attached devices

A network administrator has issued the "logging trap 4" global configuration mode command. What is the result of this command?

the syslog client sends to the syslog server any event message that has a severity level of 4 and lower

What is a function of the switch boot loader?

to provide an environment to operate in when the switch operating system cannot be found

In which situation would a technician use the "show interfaces" command?

when packets are being dropped from a particular directly attached host


Ensembles d'études connexes

Econ 2035: Exam 3 - Ch. 12 (Part1)

View Set

Organizational Management (Chapter 3)

View Set

CM, Ch. 3 Organizational Structure and Culture

View Set

Staphylococcus, Micrococcus and similar organisms

View Set