ITSC - Networking chapter 2 - practice questions

Ace your homework & exams now with Quizwiz!

loopback

A ____ address is defined as a reserved address that routes packets back to the host.

traceroute - tracert

A command on many computer operating systems that discovers the IP addresses, and possibly host names, of the routers used by the network when sending a packet from one computer to another.

IOS - Cisco Internetwork Operating System

A generic term for the collection of network operating systems used on Cisco networking devices.

Type the command and then press the ? key.

A network administrator has forgotten the argument of an IOS command. How would the administrator get help from the IOS CLI to complete the command correctly?

What models of routers and switches require upgrades? Do the routers and switches have enough RAM and flash memory for the proposed IOS versions? What features are required for the devices?

A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade?

SSH

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

Left-arrow key or Ctrl-B

Moves the cursor one character to the left

Right-arrow or Ctrl-F

Moves the cursor one character to the right

Ctrl-A

Moves the cursor to the beginning of the command line

Ctrl-E

Moves the cursor to the end of the command line

terminal emulation

Network application in which a computer runs software that makes it appear to a remote host as a directly attached terminal.

privileged EXEC mode, VTY interface, console interface

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords.

Up-arrow or Ctrl-P

Recalls command in the history buffer, beginning with the most recent commands

Ctrl-R, Ctrl-I, or Ctrl-L

Redisplays the system prompt and command line after a console message is received

Ctrl-C

Redisplays, on a new line, the command currently being typed

to enable the switch to be managed remotely

Why would a Layer 2 switch need an IP address?

To add a password to a Cisco network device.

Why would a network administrator use the CLI of the Cisco IOS?

to copy an existing configuration into RAM

Why would a technician enter the command copy startup-config running-config?

privileged exec

a higher level of access but can not make global changes from this mode

description text string

add useful information when configuring an interface

Ctrl-Z

cancels any command currently being entered and returns directly to privileged EXEC mode

console port

dedicated management channel provides out of band management

show file name

display the contents of a configuration file

user exec

limited capabilities, used for basic operations

Ctrl-Shift-6

All-purpose break sequence. Used to abort DNS lookups, traceroutes, and pings

CTRL-SHIFT-6

Allows the user to interrupt an IOS process such as ping or traceroute

Up arrow

Allows the user to scroll backward through former commands

RAM - Random access memory

Also known as read-write memory. This is the main working area, or temporary storage, used by the CPU for most processing and operations. If the computer is turned off or loses power, all data is lost unless previously saved.

privileged executive - EXEC - mode

An IOS administrative level mode that supports access to configuration and management commands.

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

aux

An older way to establish a CLI session remotely is through a telephone dialup connection using a modem connected

global configuration

CLI configuration changes are made that affect the operation of the device as a whole.

true

Cisco IOS is a generic term for the collection of network operating systems used on Cisco networking devices.

tab key

Completes a partial command name entry.

Tab

Completes abbreviated commands and parameters

show running-config

Displays the contents of the currently running configuration file

Enter key

Displays the next line

Spacebar

Displays the next screen

show startup-config

Displays the saved configuration located in NVRAM

enable password

Limits access to the privileged EXEC mode

vty password

Limits device access over SSH or Telnet

console password

Limits device access using the console connection

Esc F

Moves the cursor forward one word to the right

Ctrl-R

returns directly to the privileged EXEC mode

Exit privileged EXEC mode and press Enter.

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

SSH - Secure shell

A protocol that provides a secure remote connection to a host through a TCP application.

flash

A removable component that has memory space for storage. Used on the router or switch for storing the compressed operating system image.

user EXEC mode

A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?

Loopback

A special reserved IPv4 address, 127.0.0.1 and IPv6 address of ::1, that can be used to test TCP/IP applications. Packets sent to this by a computer never leave the computer or even require a working NIC. Instead, the packet is process by IP at the lowest layer and is then sent back up the TCP/IP stack to another application on that same computer.

SVI - switch virtual interface

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?

ping

A troubleshooting tool used to verify network connectivity by sending a packet to a specific IP address and waiting for the reply.

enable secret

Encrypted password used to limit access to privileged EXEC mode from IOS user EXEC mode.

enable secret

Encrypted, limits access to the privileged EXEC mode

Ctrl-U or Ctrl-X

Erases all characters from the cursor to the beginning of the command line

Ctrl-K

Erases all characters from the cursor to the end of the command line

Esc-D

Erases all characters from the cursor to the end of the word

Ctrl-D

Erases the character at the cursor

Ctrl-W

Erases the word to the left of the cursor

CTRL-Z

Exits the configuration mode and returns to user EXEC

global configuration mode

From the privileged mode, you can enter this. From this, you can configure global parameters or enter other configuration submodes such as interface, router, and line configuration submodes.

false

IOS is copied into RAM when the device is running. This is done because of the built in memory checking capabilities of RAM.

false

If memory is described as nonvolatile that means when the device is turned off the contents of that memory will be lost.

flash

The IOS file itself is several megabytes in size and is stored in a semi-permanent memory area called __________.

to identify the device during remote access - SSH or telnet

Why is it important to configure a hostname on a device?

user executive - EXEC - mode

The limited CLI mode where the commands available to the user are a subset of those available at the privileged level. In general, use this to temporarily change terminal settings, perform basic tests, and list system information.

VTY - Virtual terminal line

The reference to text based logical interfaces on an IOS device. These are accessed using Telnet or SSH to perform administrative tasks. These lines are also called virtual type terminal.

command-line interface (CLI)

The user can interact with the shell using either the __________ or graphical user interface (GUI).

false

To add a name to a device use the devicename command.

Tab

To save time, IOS commands may be partially entered and then completed by typing which key or key combination?

false

To welcome users to the Cisco device configuration area use the banner motd #message# command

enable password

Unencrypted passord used to limit access to privileged EXEC mode from IOS user EXEC mode.

CLI - Command-line interface

User interface to a computer operating system or application that depends on textual commands being entered by the user.

GUI - Graphical user interface

User-friendly interface that uses graphical images and widgets, along with text, to indicate the information and actions available to a user when interacting with a computer.

SVI - switch virtual interfaces

Virtual interfaces for which there is no physical hardware on the device associated. They are created in software and used as a means to remotely manage a switch over a network. They are also used as a method of routing between VLANs.

Hosts can connect to the network and get an IP address without manual configuration.

What benefit does DHCP provide to a network?

ipconfig

What command can be used on a Windows PC to see the IP configuration of that computer?

(config)# service password-encryption

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

Each IP address must be unique within the local network.

What criterion must be followed in the design of an IPv4 addressing scheme for end devices?

All passwords in the configuration are not shown in clear text when viewing the configuration.

What is a result of using the service password-encryption command on a Cisco network device?

if there is connectivity with the destination device

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

the privileged executive mode password

What is encrypted with the enable secret command?

IOS

What will a network administrator use to modify a configuration on a Cisco router?

Ctrl-Z

When in any configuration mode, end the configuration mode and returns to privileged EXEC mode

Ctrl-C

When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode. When in setup mode, aborts to the command prompt

local router

Which device acts as a gateway to allow hosts to send traffic to remote IP networks?

the switch virtual interface

Which interface allows remote management of a Layer 2 switch?

console cable aux port telnet or ssh

Which of these are common ways to access the CLI environment of a Cisco device?

Use the console port to locally access the switch from a serial or USB interface of the PC.

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

A host name can include letters, digits, and dashes and must contain fewer than 64 characters and cannot contain a space. It could be registered with a DNS server, but this is not a requirement.

Which statement describes a feature of an IOS host name configuration?

It affects the operation of the device immediately when modified.

Which statement is true about the running configuration file in a Cisco IOS device?

numbers, dash

Which two characters are allowed as part of the hostname of a Cisco device?

Flash provides nonvolatile storage. The contents of flash may be overwritten.

Which two features are characteristics of flash memory?

displaying a list of all available commands within the current mode, determining which option, keyword, or argument is available for the entered command

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?

This is the default mode on an unconfigured router when first powered up. Only some aspects of the router configuration can be viewed.

Which two statements are true regarding the user EXEC mode?

Issue the reload command without saving the running configuration.

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

ssh

provides a remote login similar to Telnet, except that it uses more secure network services. This access method provides stronger password authentication than Telnet and uses encryption when transporting session data.

ping IP-address

use this command to report whether you can communicate with a device


Related study sets

Chapter 48: Nursing Assessment: Endocrine System

View Set

Water - Liquid Awesome: Crash Course Biology #2 Review

View Set

Chapter 16: B.F Skinner - Behavioural Analysis

View Set

The Ras Raf Mek Erk Pathway (MAPK)

View Set

Series 7 Chapter 7: Issuing Securities

View Set

Supply Chain Management McGrall Hill Questions

View Set

ixl what causes the seasons on earth

View Set

4. Project Integration Management Terminology

View Set