1/43
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
C
1. Which IOS mode allows access to all commands and features?
A. Global configuration mode
B. Interface subconfiguration mode
C. Privileged EXEC mode
D. User EXEC mode
A
2. Which IOS mode are you in if the Switch(config)# prompt is displayed?
A. Global configuration mode
B. Interface subconfiguration mode
C. Privileged EXEC mode
D. User EXEC mode
D
3. Which IOS mode are you in if the Switch> prompt is displayed?
A. Global configuration mode
B. Interface subconfiguration mode
C. Privileged EXEC mode
D. User EXEC mode
A
4. Which command would return you to the privileged EXEC prompt regardless of the
configuration mode you are in?
A. CTRL+Z
B. Disable
C. Enable
D. Exit
C
5. Which command would return you to the privileged EXEC prompt regardless of the
configuration mode you are in?
A. Disable
B. Enable
C. End
D. Exit
A
6. What is the command to assign the name “Sw-Floor-2” to a switch?
A. hostname Sw-Floor-2
B. host name Sw-Floor-2
C. name Sw-Floor-2
C
7. How is the privileged EXEC mode access secured on a switch?
A. enable class
B. secret class
C. enable secret class
D. vice password-encryption
B
8. Which command enables password authentication for user EXEC mode access on a switch?
A. enable secret
B. login
C. secret
D. service password-encryption
D
9. Which command encrypts all plaintext passwords access on a switch?
A. enable secret
B. login
C. secret
D. service password-encryption
B
10. Which is the command to configure a banner to be displayed when connecting to a switch?
A. banner # Keep out #
B. banner motd # Keep out #
C. display $ Keep out $
D. login banner $ Keep out $
A
11. What are the IOS command modes listed in the access order?
A. 1 – User EXEC; 2 – Privileged EXEC; 3 – Global Configuration; 4 – Sub-configuration
B. 1 – Privileged EXEC; 2 – User EXEC; 3 – Global Configuration; 4 – Sub-configuration
C. 1 – User EXEC; 2 – Privileged EXEC; 3 – Sub-configuration; 4 – Exit
D. 1 – Privileged EXEC; 2 – Global Configuration; 3 – User EXEC; 4 – Exit
B
12. What is the structure of an IPv4 address called?
A. Dotted-binary format
B. Dotted-decimal format
C. Dotted-hexadecimal format
B
13. How is an IPv4 address represented?
A. Four binary numbers between 0 and 1 separated by colons.t
B. Four decimal numbers between 0 and 255 separated by periods.
C. Thirty-two hexadecimal numbers separated by colons.
D. Thirty-two hexadecimal numbers separated by periods.
D
14. What type of interface has no physical port associated with it?
A. Console
B. Ethernet
C. Serial
D. Switched Virtual Interface (SVI)
A
15. Which statement is true about the running configuration file in a Cisco IOS device?
A. It affects the operation of the device immediately when modified.
B. It is stored in NVRAM.
C. It should be deleted using the erase running-config command.
D. It is automatically saved when the router reboots.
C
16. Which statement is true regarding the user EXEC mode?
A. All router commands are available.
B. Global configuration mode can be accessed by entering the enable command.
C. The device prompt for this mode ends with the “>” symbol.
D. Interfaces and routing protocols can be configured.
D
17. Which statement is true regarding the user EXEC mode?
A. All router commands are available.
B. Global configuration mode can be accessed by entering the enable command.
C. Interfaces and routing protocols can be configured.
D. Only some aspects of the router configuration can be viewed.
B
18. Which type of access is secured on a Cisco router or switch with the enable secret command?
A. Virtual terminal
B. Privileged EXEC
C. AUX port
D. Console line
A
19. What is the default SVI on a Cisco switch?
A. VLAN1
B. VLAN99
C. VLAN100
D. VLAN999
D
20. A router with a valid operating system contains a configuration file stored in NVRAM. The
configuration file has an enable secret password but no console password. When the router
boots up, which mode will display?
A. Global configuration mode
B. Setup mode
C. Privileged EXEC mode
D. User EXEC mode
A
21. An administrator has just changed the IP address of an interface on an IOS device. What else
must be done in order to apply those changes to the device?
A. Copy the running configuration to the startup configuration file.
B. Copy the information in the startup configuration file to the running configuration.
C. Reload the device and type yes when prompted to save the configuration.
D. Nothing must be done. Changes to the configuration on an IOS device take effect as
soon as the command is typed correctly and the Enter key has been pressed.
D
22. Which memory location on a Cisco router or switch will lose all content when the device is
restarted?
A. ROM
B. flash
C. NVRAM
D. RAM
C
23. Why would a technician enter the command copy startup-config running-config?
A. To remove all configurations from the switch
B. To save an active configuration to NVRAM
C. To copy an existing configuration into RAM
D. To make a changed configuration the new startup configuration
A
24. Which functionality is provided by DHCP?
A. Automatic assignment of an IP address to each host
B. Remote switch management
C. Translation of IP addresses to domain names
D. End-to-end connectivity test
B
25. Which function is provided to users by the context-sensitive help feature of the Cisco IOS CLI?
A. Providing an error message when a wrong command is submitted
B. Displaying a list of all available commands within the current mode
C. Allowing the user to complete the remainder of an abbreviated command with the TAB
key
D. Selecting the best command to accomplish a task
C
26. Which function is provided to users by the context-sensitive help feature of the Cisco IOS CLI?
A. Providing an error message when a wrong command is submitted
B. Allowing the user to complete the remainder of an abbreviated command with the TAB
key
C. Determining which option, keyword, or argument is available for the entered command
D. Selecting the best command to accomplish a task
C
27. Which memory location on a Cisco router or switch stores the startup configuration file?
A. RAM
B. ROM
C. NVRAM
D. Flash
C
28. Which interface allows remote management of a Layer 2 switch?
A. The AUX interface
B. The console port interface
C. The switch virtual interface
D. The first Ethernet port interface
D
29. What function does pressing the Tab key have when entering a command in IOS?
A. It aborts the current command and returns to configuration mode.
B. It exits configuration mode and returns to user EXEC mode.
C. It moves the cursor to the beginning of the next line.
D. It completes the remainder of a partially typed word in a command.
A
30. While trying to solve a network issue, a technician made multiple changes to the current router
configuration file. The changes did not solve the problem and were not saved. What action can
the technician take to discard the changes and work with the file in NVRAM?
A. Issue the reload command without saving the running configuration.
B. Delete the vlan.dat file and reboot the device.
C. Close and reopen the terminal emulation software.
D. Issue the copy startup-config running-config command.
B
31. An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping
command. What is the purpose of using these keystrokes?
A. To restart the ping process
B. To interrupt the ping process
C. To exit to a different configuration mode
D. To allow the user to complete the command
B
32. A technician configures a switch with these commands:
What is the technician configuring?
A. Telnet access
B. SVI
C. password encryption
D. physical switchport access
B
33. Which command or key combination allows a user to return to the previous level in the
command hierarchy?
A. End
B. Exit
C. Ctrl-Z
D. Ctrl-C
B
34. What is a characteristic of RAM on a Cisco device?
A. RAM provides nonvolatile storage.
B. The configuration that is actively running on the device is stored in RAM.
C. RAM is a component in Cisco switches but not in Cisco routers.
D. RAM is able to store multiple versions of IOS and configuration files.
B
35. What is a characteristic of RAM on a Cisco device?
A. RAM provides nonvolatile storage.
B. The contents of RAM are lost during a power cycle.
C. RAM is a component in Cisco switches but not in Cisco routers.
D. RAM is able to store multiple versions of IOS and configuration files.
B
36. How is SSH different from Telnet?
A. SSH makes connections over the network, whereas Telnet is for out-of-band access.
B. SSH provides security to remote sessions by encrypting messages and using user
authentication. Telnet is considered insecure and sends messages in plaintext.
C. SSH requires the use of the PuTTY terminal emulation program. Tera Term must be
used to connect to devices through the use of Telnet.
D. SSH must be configured over an active network connection, whereas Telnet is used to
connect to a device from a console connection.
B
37. What is a characteristic of an SVI?
A. It is designed as a security protocol to protect switch ports.
B. It is not associated with any physical interface on a switch.
C. It is a special interface that allows connectivity by different types of media.
D. It is required to allow connectivity by any device at any location.
C
38. What is a characteristic of an SVI?
A. It is designed as a security protocol to protect switch ports.
B. It is a special interface that allows connectivity by different types of media.
C. It provides a means to remotely manage a switch.
D. It is required to allow connectivity by any device at any location.
D
39. What is a characteristic of an SVI?
A. It is designed as a security protocol to protect switch ports.
B. It is a special interface that allows connectivity by different types of media.
C. It is required to allow connectivity by any device at any location.
D. It is associated with VLAN1 by default.
D
40. What command is used to verify the condition of the switch interfaces, including the status of
the interfaces and a configured IP address?
A. ipconfig
B. ping
C. traceroute
D. show ip interface brief
B
41. After making configuration changes on a Cisco switch, a network administrator issues a copy
running-config startup-config command. What is the result of issuing this command?
A. The new configuration will be stored in flash memory.
B. The new configuration will be loaded if the switch is restarted.
C. The current IOS file will be replaced with the newly configured file.
D. The configuration changes will be removed and the original configuration will be restored.
C
42. What command will prevent all unencrypted passwords from displaying in plain text in a
configuration file?
A. (config)# enable password secret
B. (config-line)# password secret
C. (config)# service password-encryption
D. (config)# enable secret Encrypted_Password
B
43. A network administrator enters the service password-encryption command into the
configuration mode of a router. What does this command accomplish?
A. This command encrypts passwords as they are transmitted across serial WAN links.
B. This command prevents someone from viewing the running configuration passwords.
C. This command enables a strong encryption algorithm for the enable secret password
command.
D. This command automatically encrypts passwords in configuration files that are currently
stored in NVRAM.
C
44. Why would a Layer 2 switch need an IP address?
A. To enable the switch to send broadcast frames to attached PCs
B. To enable the switch to function as a default gateway
C. To enable the switch to be managed remotely
D. To enable the switch to receive frames from attached PCs