Topic 2 Bonus questions

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/43

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 5:24 PM on 2/12/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

44 Terms

1
New cards

C

1. Which IOS mode allows access to all commands and features?

A. Global configuration mode

B. Interface subconfiguration mode

C. Privileged EXEC mode

D. User EXEC mode

2
New cards

A

2. Which IOS mode are you in if the Switch(config)# prompt is displayed?

A. Global configuration mode

B. Interface subconfiguration mode

C. Privileged EXEC mode

D. User EXEC mode

3
New cards

D

3. Which IOS mode are you in if the Switch> prompt is displayed?

A. Global configuration mode

B. Interface subconfiguration mode

C. Privileged EXEC mode

D. User EXEC mode

4
New cards

A

4. Which command would return you to the privileged EXEC prompt regardless of the

configuration mode you are in?

A. CTRL+Z

B. Disable

C. Enable

D. Exit

5
New cards

C

5. Which command would return you to the privileged EXEC prompt regardless of the

configuration mode you are in?

A. Disable

B. Enable

C. End

D. Exit

6
New cards

A

6. What is the command to assign the name “Sw-Floor-2” to a switch?

A. hostname Sw-Floor-2

B. host name Sw-Floor-2

C. name Sw-Floor-2

7
New cards

C

7. How is the privileged EXEC mode access secured on a switch?

A. enable class

B. secret class

C. enable secret class

D. vice password-encryption

8
New cards

B

8. Which command enables password authentication for user EXEC mode access on a switch?

A. enable secret

B. login

C. secret

D. service password-encryption

9
New cards

D

9. Which command encrypts all plaintext passwords access on a switch?

A. enable secret

B. login

C. secret

D. service password-encryption

10
New cards

B

10. Which is the command to configure a banner to be displayed when connecting to a switch?

A. banner # Keep out #

B. banner motd # Keep out #

C. display $ Keep out $

D. login banner $ Keep out $

11
New cards

A

11. What are the IOS command modes listed in the access order?

A. 1 – User EXEC; 2 – Privileged EXEC; 3 – Global Configuration; 4 – Sub-configuration

B. 1 – Privileged EXEC; 2 – User EXEC; 3 – Global Configuration; 4 – Sub-configuration

C. 1 – User EXEC; 2 – Privileged EXEC; 3 – Sub-configuration; 4 – Exit

D. 1 – Privileged EXEC; 2 – Global Configuration; 3 – User EXEC; 4 – Exit

12
New cards

B

12. What is the structure of an IPv4 address called?

A. Dotted-binary format

B. Dotted-decimal format

C. Dotted-hexadecimal format

13
New cards

B

13. How is an IPv4 address represented?

A. Four binary numbers between 0 and 1 separated by colons.t

B. Four decimal numbers between 0 and 255 separated by periods.

C. Thirty-two hexadecimal numbers separated by colons.

D. Thirty-two hexadecimal numbers separated by periods.

14
New cards

D

14. What type of interface has no physical port associated with it?

A. Console

B. Ethernet

C. Serial

D. Switched Virtual Interface (SVI)

15
New cards

A

15. Which statement is true about the running configuration file in a Cisco IOS device?

A. It affects the operation of the device immediately when modified.

B. It is stored in NVRAM.

C. It should be deleted using the erase running-config command.

D. It is automatically saved when the router reboots.

16
New cards

C

16. Which statement is true regarding the user EXEC mode?

A. All router commands are available.

B. Global configuration mode can be accessed by entering the enable command.

C. The device prompt for this mode ends with the “>” symbol.

D. Interfaces and routing protocols can be configured.

17
New cards

D

17. Which statement is true regarding the user EXEC mode?

A. All router commands are available.

B. Global configuration mode can be accessed by entering the enable command.

C. Interfaces and routing protocols can be configured.

D. Only some aspects of the router configuration can be viewed.

18
New cards

B

18. Which type of access is secured on a Cisco router or switch with the enable secret command?

A. Virtual terminal

B. Privileged EXEC

C. AUX port

D. Console line

19
New cards

A

19. What is the default SVI on a Cisco switch?

A. VLAN1

B. VLAN99

C. VLAN100

D. VLAN999

20
New cards

D

20. A router with a valid operating system contains a configuration file stored in NVRAM. The

configuration file has an enable secret password but no console password. When the router

boots up, which mode will display?

A. Global configuration mode

B. Setup mode

C. Privileged EXEC mode

D. User EXEC mode

21
New cards

A

21. An administrator has just changed the IP address of an interface on an IOS device. What else

must be done in order to apply those changes to the device?

A. Copy the running configuration to the startup configuration file.

B. Copy the information in the startup configuration file to the running configuration.

C. Reload the device and type yes when prompted to save the configuration.

D. Nothing must be done. Changes to the configuration on an IOS device take effect as

soon as the command is typed correctly and the Enter key has been pressed.

22
New cards

D

22. Which memory location on a Cisco router or switch will lose all content when the device is

restarted?

A. ROM

B. flash

C. NVRAM

D. RAM

23
New cards

C

23. Why would a technician enter the command copy startup-config running-config?

A. To remove all configurations from the switch

B. To save an active configuration to NVRAM

C. To copy an existing configuration into RAM

D. To make a changed configuration the new startup configuration

24
New cards

A

24. Which functionality is provided by DHCP?

A. Automatic assignment of an IP address to each host

B. Remote switch management

C. Translation of IP addresses to domain names

D. End-to-end connectivity test

25
New cards

B

25. Which function is provided to users by the context-sensitive help feature of the Cisco IOS CLI?

A. Providing an error message when a wrong command is submitted

B. Displaying a list of all available commands within the current mode

C. Allowing the user to complete the remainder of an abbreviated command with the TAB

key

D. Selecting the best command to accomplish a task

26
New cards

C

26. Which function is provided to users by the context-sensitive help feature of the Cisco IOS CLI?

A. Providing an error message when a wrong command is submitted

B. Allowing the user to complete the remainder of an abbreviated command with the TAB

key

C. Determining which option, keyword, or argument is available for the entered command

D. Selecting the best command to accomplish a task

27
New cards

C

27. Which memory location on a Cisco router or switch stores the startup configuration file?

A. RAM

B. ROM

C. NVRAM

D. Flash

28
New cards

C

28. Which interface allows remote management of a Layer 2 switch?

A. The AUX interface

B. The console port interface

C. The switch virtual interface

D. The first Ethernet port interface

29
New cards

D

29. What function does pressing the Tab key have when entering a command in IOS?

A. It aborts the current command and returns to configuration mode.

B. It exits configuration mode and returns to user EXEC mode.

C. It moves the cursor to the beginning of the next line.

D. It completes the remainder of a partially typed word in a command.

30
New cards

A

30. While trying to solve a network issue, a technician made multiple changes to the current router

configuration file. The changes did not solve the problem and were not saved. What action can

the technician take to discard the changes and work with the file in NVRAM?

A. Issue the reload command without saving the running configuration.

B. Delete the vlan.dat file and reboot the device.

C. Close and reopen the terminal emulation software.

D. Issue the copy startup-config running-config command.

31
New cards

B

31. An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping

command. What is the purpose of using these keystrokes?

A. To restart the ping process

B. To interrupt the ping process

C. To exit to a different configuration mode

D. To allow the user to complete the command

32
New cards

B

32. A technician configures a switch with these commands:

What is the technician configuring?

A. Telnet access

B. SVI

C. password encryption

D. physical switchport access

33
New cards

B

33. Which command or key combination allows a user to return to the previous level in the

command hierarchy?

A. End

B. Exit

C. Ctrl-Z

D. Ctrl-C

34
New cards

B

34. What is a characteristic of RAM on a Cisco device?

A. RAM provides nonvolatile storage.

B. The configuration that is actively running on the device is stored in RAM.

C. RAM is a component in Cisco switches but not in Cisco routers.

D. RAM is able to store multiple versions of IOS and configuration files.

35
New cards

B

35. What is a characteristic of RAM on a Cisco device?

A. RAM provides nonvolatile storage.

B. The contents of RAM are lost during a power cycle.

C. RAM is a component in Cisco switches but not in Cisco routers.

D. RAM is able to store multiple versions of IOS and configuration files.

36
New cards

B

36. How is SSH different from Telnet?

A. SSH makes connections over the network, whereas Telnet is for out-of-band access.

B. SSH provides security to remote sessions by encrypting messages and using user

authentication. Telnet is considered insecure and sends messages in plaintext.

C. SSH requires the use of the PuTTY terminal emulation program. Tera Term must be

used to connect to devices through the use of Telnet.

D. SSH must be configured over an active network connection, whereas Telnet is used to

connect to a device from a console connection.

37
New cards

B

37. What is a characteristic of an SVI?

A. It is designed as a security protocol to protect switch ports.

B. It is not associated with any physical interface on a switch.

C. It is a special interface that allows connectivity by different types of media.

D. It is required to allow connectivity by any device at any location.

38
New cards

C

38. What is a characteristic of an SVI?

A. It is designed as a security protocol to protect switch ports.

B. It is a special interface that allows connectivity by different types of media.

C. It provides a means to remotely manage a switch.

D. It is required to allow connectivity by any device at any location.

39
New cards

D

39. What is a characteristic of an SVI?

A. It is designed as a security protocol to protect switch ports.

B. It is a special interface that allows connectivity by different types of media.

C. It is required to allow connectivity by any device at any location.

D. It is associated with VLAN1 by default.

40
New cards

D

40. What command is used to verify the condition of the switch interfaces, including the status of

the interfaces and a configured IP address?

A. ipconfig

B. ping

C. traceroute

D. show ip interface brief

41
New cards

B

41. After making configuration changes on a Cisco switch, a network administrator issues a copy

running-config startup-config command. What is the result of issuing this command?

A. The new configuration will be stored in flash memory.

B. The new configuration will be loaded if the switch is restarted.

C. The current IOS file will be replaced with the newly configured file.

D. The configuration changes will be removed and the original configuration will be restored.

42
New cards

C

42. What command will prevent all unencrypted passwords from displaying in plain text in a

configuration file?

A. (config)# enable password secret

B. (config-line)# password secret

C. (config)# service password-encryption

D. (config)# enable secret Encrypted_Password

43
New cards

B

43. A network administrator enters the service password-encryption command into the

configuration mode of a router. What does this command accomplish?

A. This command encrypts passwords as they are transmitted across serial WAN links.

B. This command prevents someone from viewing the running configuration passwords.

C. This command enables a strong encryption algorithm for the enable secret password

command.

D. This command automatically encrypts passwords in configuration files that are currently

stored in NVRAM.

44
New cards

C

44. Why would a Layer 2 switch need an IP address?

A. To enable the switch to send broadcast frames to attached PCs

B. To enable the switch to function as a default gateway

C. To enable the switch to be managed remotely

D. To enable the switch to receive frames from attached PCs