ITSC - Networking chapter 2 - practice questions
loopback
A ____ address is defined as a reserved address that routes packets back to the host.
traceroute - tracert
A command on many computer operating systems that discovers the IP addresses, and possibly host names, of the routers used by the network when sending a packet from one computer to another.
IOS - Cisco Internetwork Operating System
A generic term for the collection of network operating systems used on Cisco networking devices.
Type the command and then press the ? key.
A network administrator has forgotten the argument of an IOS command. How would the administrator get help from the IOS CLI to complete the command correctly?
What models of routers and switches require upgrades? Do the routers and switches have enough RAM and flash memory for the proposed IOS versions? What features are required for the devices?
A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade?
SSH
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
Left-arrow key or Ctrl-B
Moves the cursor one character to the left
Right-arrow or Ctrl-F
Moves the cursor one character to the right
Ctrl-A
Moves the cursor to the beginning of the command line
Ctrl-E
Moves the cursor to the end of the command line
terminal emulation
Network application in which a computer runs software that makes it appear to a remote host as a directly attached terminal.
privileged EXEC mode, VTY interface, console interface
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords.
Up-arrow or Ctrl-P
Recalls command in the history buffer, beginning with the most recent commands
Ctrl-R, Ctrl-I, or Ctrl-L
Redisplays the system prompt and command line after a console message is received
Ctrl-C
Redisplays, on a new line, the command currently being typed
to enable the switch to be managed remotely
Why would a Layer 2 switch need an IP address?
To add a password to a Cisco network device.
Why would a network administrator use the CLI of the Cisco IOS?
to copy an existing configuration into RAM
Why would a technician enter the command copy startup-config running-config?
privileged exec
a higher level of access but can not make global changes from this mode
description text string
add useful information when configuring an interface
Ctrl-Z
cancels any command currently being entered and returns directly to privileged EXEC mode
console port
dedicated management channel provides out of band management
show file name
display the contents of a configuration file
user exec
limited capabilities, used for basic operations
Ctrl-Shift-6
All-purpose break sequence. Used to abort DNS lookups, traceroutes, and pings
CTRL-SHIFT-6
Allows the user to interrupt an IOS process such as ping or traceroute
Up arrow
Allows the user to scroll backward through former commands
RAM - Random access memory
Also known as read-write memory. This is the main working area, or temporary storage, used by the CPU for most processing and operations. If the computer is turned off or loses power, all data is lost unless previously saved.
privileged executive - EXEC - mode
An IOS administrative level mode that supports access to configuration and management commands.
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
aux
An older way to establish a CLI session remotely is through a telephone dialup connection using a modem connected
global configuration
CLI configuration changes are made that affect the operation of the device as a whole.
true
Cisco IOS is a generic term for the collection of network operating systems used on Cisco networking devices.
tab key
Completes a partial command name entry.
Tab
Completes abbreviated commands and parameters
show running-config
Displays the contents of the currently running configuration file
Enter key
Displays the next line
Spacebar
Displays the next screen
show startup-config
Displays the saved configuration located in NVRAM
enable password
Limits access to the privileged EXEC mode
vty password
Limits device access over SSH or Telnet
console password
Limits device access using the console connection
Esc F
Moves the cursor forward one word to the right
Ctrl-R
returns directly to the privileged EXEC mode
Exit privileged EXEC mode and press Enter.
A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?
SSH - Secure shell
A protocol that provides a secure remote connection to a host through a TCP application.
flash
A removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image.
user EXEC mode
A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?
Loopback
A special reserved IPv4 address, 127.0.0.1 and IPv6 address of ::1, that can be used to test TCP/IP applications. Packets sent to this by a computer never leave the computer or even require a working NIC. Instead, the packet is process by IP at the lowest layer and is then sent back up the TCP/IP stack to another application on that same computer.
SVI - switch virtual interface
A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?
ping
A troubleshooting tool used to verify network connectivity by sending a packet to a specific IP address and waiting for the reply.
enable secret
Encrypted password used to limit access to privileged EXEC mode from IOS user EXEC mode.
enable secret
Encrypted, limits access to the privileged EXEC mode
Ctrl-U or Ctrl-X
Erases all characters from the cursor to the beginning of the command line
Ctrl-K
Erases all characters from the cursor to the end of the command line
Esc-D
Erases all characters from the cursor to the end of the word
Ctrl-D
Erases the character at the cursor
Ctrl-W
Erases the word to the left of the cursor
CTRL-Z
Exits the configuration mode and returns to user EXEC
global configuration mode
From the privileged mode, you can enter this. From this, you can configure global parameters or enter other configuration submodes such as interface, router, and line configuration submodes.
false
IOS is copied into RAM when the device is running. This is done because of the built in memory checking capabilities of RAM.
false
If memory is described as nonvolatile that means when the device is turned off the contents of that memory will be lost.
flash
The IOS file itself is several megabytes in size and is stored in a semi-permanent memory area called __________.
to identify the device during remote access - SSH or telnet
Why is it important to configure a hostname on a device?
user executive - EXEC - mode
The limited CLI mode where the commands available to the user are a subset of those available at the privileged level. In general, use this to temporarily change terminal settings, perform basic tests, and list system information.
VTY - Virtual terminal line
The reference to text based logical interfaces on an IOS device. These are accessed using Telnet or SSH to perform administrative tasks. These lines are also called virtual type terminal.
command-line interface (CLI)
The user can interact with the shell using either the __________ or graphical user interface (GUI).
false
To add a name to a device use the devicename command.
Tab
To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
false
To welcome users to the Cisco device configuration area use the banner motd #message# command
enable password
Unencrypted passord used to limit access to privileged EXEC mode from IOS user EXEC mode.
CLI - Command-line interface
User interface to a computer operating system or application that depends on textual commands being entered by the user.
GUI - Graphical user interface
User-friendly interface that uses graphical images and widgets, along with text, to indicate the information and actions available to a user when interacting with a computer.
SVI - switch virtual interfaces
Virtual interfaces for which there is no physical hardware on the device associated. They are created in software and used as a means to remotely manage a switch over a network. They are also used as a method of routing between VLANs.
Hosts can connect to the network and get an IP address without manual configuration.
What benefit does DHCP provide to a network?
ipconfig
What command can be used on a Windows PC to see the IP configuration of that computer?
(config)# service password-encryption
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
Each IP address must be unique within the local network.
What criterion must be followed in the design of an IPv4 addressing scheme for end devices?
All passwords in the configuration are not shown in clear text when viewing the configuration.
What is a result of using the service password-encryption command on a Cisco network device?
if there is connectivity with the destination device
What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?
the privileged executive mode password
What is encrypted with the enable secret command?
IOS
What will a network administrator use to modify a configuration on a Cisco router?
Ctrl-Z
When in any configuration mode, end the configuration mode and returns to privileged EXEC mode
Ctrl-C
When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode. When in setup mode, aborts to the command prompt
local router
Which device acts as a gateway to allow hosts to send traffic to remote IP networks?
the switch virtual interface
Which interface allows remote management of a Layer 2 switch?
console cable aux port telnet or ssh
Which of these are common ways to access the CLI environment of a Cisco device?
Use the console port to locally access the switch from a serial or USB interface of the PC.
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
A host name can include letters, digits, and dashes and must contain fewer than 64 characters and cannot contain a space. It could be registered with a DNS server, but this is not a requirement.
Which statement describes a feature of an IOS host name configuration?
It affects the operation of the device immediately when modified.
Which statement is true about the running configuration file in a Cisco IOS device?
numbers, dash
Which two characters are allowed as part of the hostname of a Cisco device?
Flash provides nonvolatile storage. The contents of flash may be overwritten.
Which two features are characteristics of flash memory?
displaying a list of all available commands within the current mode, determining which option, keyword, or argument is available for the entered command
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?
This is the default mode on an unconfigured router when first powered up. Only some aspects of the router configuration can be viewed.
Which two statements are true regarding the user EXEC mode?
Issue the reload command without saving the running configuration.
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
ssh
provides a remote login similar to Telnet, except that it uses more secure network services. This access method provides stronger password authentication than Telnet and uses encryption when transporting session data.
ping IP-address
use this command to report whether you can communicate with a device