Chpt. 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What type of interface has no physical port associated with it?

switch virtual interface (SVI) Switch virtual interfaces (SVIs) are virtual and have no physical port. Layer 2 switches use SVIs for remote management.

Which command enables password authentication for user EXEC mode access on a switch? User EXEC mode access through the console port is enabled with the login command entered in line mode. For example: Switch(config-line)# login.

login

To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?

10.1.0.0 The purpose of a subnet mask is to separate the network portion of the address from the host portion of the IP address. The network portion of the IP address is identified by all binary 1s in the subnet mask. Using a subnet mask of 255.255.0.0 identifies the first two octets of the IP address as the network portion.

Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified As soon as configuration commands are entered into a router, they modify the device immediately. Running configuration files can not be deleted nor are they saved automatically.

What is the function of the shell in an OS?

It interfaces between the users and the kernel. Most operating systems contain a shell and a kernel. The kernel interacts with the hardware and the shell interfaces between the kernel and the users.

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed Changes to router and switch configurations take effect as soon as the command is entered. For this reason, it is very important that changes to live production devices are always carefully planned before being implemented. If commands are entered that render the device unstable or inaccessible, the device may have to be reloaded, resulting in network downtime.

Which memory location on a Cisco router or switch will lose all content when the device is restarted?

RAM RAM is volatile memory and will lose all contents if the router or switch is restarted or shutdown.

Which two statements are true regarding the user EXEC mode? (Choose two.)

The device prompt for this mode ends with the ">" symbol Only some aspects of the router configuration can be viewed User EXEC mode limits access to some show and debug commands. It is the first level of user interface encountered when configuring a router and is intended for investigation of certain functions of the device. The User EXEC prompt is identified with the ">" symbol.

Which functionality is provided by DHCP?

automatic assignment of an IP address to each host DHCP provides dynamic and automatic IP address assignment to hosts.

Which is the command to configure a banner to be displayed when connecting to a switch? The command to set a banner stating "Keep out" that will be displayed when connection to a Cisco switch is Switch(config)# banner motd $ Keep out $

banner motd $ Keep out $

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

determining which option, keyword, or argument is available for the entered command displaying a list of all available commands within the current mode Context-sensitive help provides the user with a list of commands and the arguments associated with those commands within the current mode of a networking device. A syntax checker provides error checks on submitted commands and the TAB key can be used for command completion if a partial command is entered.

What is the structure of an IPv4 address called?

dotted-decimal format IPv4 addresses are written in dotted-decimal format. For example: 192.168.1.1.

How is the privileged EXEC mode access secured on a switch? Securing access to the EXEC mode on a Cisco switch is accomplished with the enable secret command followed by the password. In this example the command is Switch(config)# enable secret class.

enable secret class

Which IOS mode are you in if the Switch(config)# prompt is displayed?

global configuration mode Global configuration mode is identified by the (config)# prompt.

What is the command to assign the name "Sw-Floor-2" to a switch? The global configuration command to set the host name on a Cisco device is hostname. So, in this example the full command is Switch(config)# hostname Sw-Floor-2.

hostname Sw-Floor-2

Why would a technician enter the command copy startup-config running-config?

to copy an existing configuration into RAM Usually, changes are made to a running configuration in RAM and copied to NVRAM. However, in this case, the technician wants to copy a previously saved configuration from NVRAM into RAM in order to make changes to it.?

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

user EXEC mode If a Cisco IOS device has a valid IOS and a valid configuration file, it will boot into user EXEC mode. A password will be required to enter privileged EXEC mode.

Which IOS mode are you in if the Switch> prompt is displayed?

user EXEC mode The > prompt after the device name identifies user EXEC mode.

Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection?

Aux

Which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in? (Choose two.)

CTRL + Z End To return from any prompt, all the way down to privileged EXEC mode, type the end command or by pressing the CTRL+Z keys simultaneously on the keyboard.

Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured?

Console

Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?

Console

Which memory location on a Cisco router or switch stores the startup configuration file?

NVRAM The startup configuration file of a Cisco router or switch is stored in NVRAM, which is nonvolatile memory.

Which type of access is secured on a Cisco router or switch with the enable secret command?

Privileged EXEC The enable secret command secures access to the privileged EXEC mode of a Cisco router or switch. virtual terminal

Which access method would be the most appropriate in-band access to the IOS over a network connection?

Telnet/SSH

What is the default SVI on a Cisco switch?

VLAN1 Layer 2 switches use switch virtual interfaces (SVIs) to provide a means for remote access over IP. The default SVI on a Cisco switch is VLAN1.

How is an IPv4 address represented?

four decimal numbers between 0 and 255 separated by periods IPv4 addresses are written as four groups of decimal numbers separated by periods. For example: 192.168.1.1.

Which IOS mode allows access to all commands and features?

privileged EXEC mode The priveleged EXEC mode allows access to all commands. Higher level commands like global configuration mode and subconfiguration modes can only be reached from the privileged EXEC mode.)

Which command encrypts all plaintext passwords access on a switch? The service password-encryption command entered in global configuration mode will encrypt all plaintext passwords.

service password-encryption

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

the hostname should contain no spaces the hostname should begin with a letter the hostname should be fewer than 64 characters in length A hostname can be configured with upper or lower case characters and should end with a letter or digit, not a special character. A hostname should start with a letter and no space is allowed for a hostname.


Set pelajaran terkait

Unit 3 Marketing In Class Questions

View Set

Social Studies 7-12 Texas History

View Set

psychology final past quiz questions

View Set

Chapter 1: Professional Nursing Practice

View Set