Quiz 2

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file? (2.2.2) (config)# enable password secret (config)# enable secret Secret_Password (config-line)# password secret Correct! (config)# service password-encryption (config)# enable secret Encrypted_Password

(config)# service password-encryption

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? (2.2.3) Copy the running configuration to the startup configuration file. Copy the information in the startup configuration file to the running configuration. Reload the device and type yes when prompted to save the configuration. Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

How is SSH different from Telnet? SSH makes connections over the network, whereas Telnet is for out-of-band access. SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext. SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through the use of Telnet. SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a console connection.

SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (choose two) (2.1.4) Providing an error message when wrong command is submitted displaying a list of all available commands within current mode allowing the user to complete the remainder of abbreviated command with the tab key determining which option, keyword, or argument is available for the entered command

determining which option, keyword, or argument is available for the entered command determining which option, keyword, or argument is available for the entered command

Which device acts as a gateway to allow hosts to send traffic to remote IP networks? (2.3.1) DNS server DHCP server local router local switch

local router

Mobile devices do not require IP addresses to communicate on the internet. (T or F) (2.3.1)

False

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring? (2.3.2) Telnet access SVI password encryption physical switchport access

SVI

To save time, IOS commands may be partially entered and then completed by typing which key or key combination?

Tab

Which two statements are true regarding the user exec mode? (choose two) (2.1.3) All router commands are available Global configuration mode can be accessed by entering the enable command The device prompt for this mode ends with the ">" symbol Interfaces and routing protocols can be configured only some aspects of the router configuration can be viewed

The device prompt for this mode ends with the ">" symbol only some aspects of the router configuration can be viewed

An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect to the LAN, the employee receives a duplicate IP address error message. What can the company do to prevent this situation from arising again? (2.3.2) Configure the IP address on an SVI on the laptop. Use a virtual private network instead of the company LAN. Correct! Use DHCP to automatically assign addresses. Use laptops that do not require IP addresses.

Use DHCP to automatically assign addresses.

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) (2.2.2) VTY interface console interface Ethernet interface boot IOS mode privileged EXEC mode router configuration mode

VTY interface console interface privileged EXEC mode

In order to test end-to-end connectivity, you would use the _________ command. (2.2.3)

ping

The component of the operating software that provides the user interface is called the ____________ (2.1.1)

shell

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.) (2.2.1) the hostname should be fewer than 64 characters in length the hostname should be written in all lower case characters the hostname should contain no spaces the hostname should end with a special character the hostname should begin with a letter

the hostname should be fewer than 64 characters in length the hostname should contain no spaces the hostname should begin with a letter

Why would a technician enter the command copy startup-config running-config? (2.2.3) to remove all configurations from the switch to save an active configuration to NVRAM to copy an existing configuration into RAM to make a changed configuration the new startup configuration

to copy an existing configuration into RAM


Set pelajaran terkait

Logistics Topic 1: What is Logistics?

View Set

Volume 4, Chapters 1-5: Pre-Test

View Set

Historical Theology Focus Questions

View Set

MACRO FINAL - ALL PREVIOUS TEST QUESTIONS]

View Set

29:Care of the Hospitalized Child PrepU's

View Set

Chapter 15: Introduction to Database Concepts

View Set

Brinkley APUSH Chapter 27 - The Cold War

View Set

TREC Promulgated Contract Forms #351 Final

View Set