Cisco CCNA 1 Routing and Switching : Configure a Network Operating System Chapter 2 Quiz 2

Posted on

Cisco CCNA 1 Routing and Switching : Configure a Network Operating System Chapter 2 Quiz 2

Problem 1

Question :

1. Which device acts as a gateway to allow hosts to send traffic to remote IP networks?

Answer Option Choices :

DNS server
DHCP server
local router
local switch

Correct Answer :

local router

Explanation :

Refer to curriculum topic: 2.3.1
For hosts to reach remote networks, they must send traffic to a local router that can route the traffic to the correct destination network. This local router is known as the default gateway and hosts must be configured with this address in order to communicate with devices on remote networks.

Problem 2

Question :

2. A technician configures a switch with these commands:

SwitchA(config)# interface vlan 1
SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown

What is the technician configuring?

Answer Option Choices :

Telnet access
SVI
password encryption
physical switchport access

Correct Answer :

SVI

Explanation :

Refer to curriculum topic: 2.3.2
For a switch to have an IP address, a switch virtual interface must be configured. This allows the switch to be managed remotely over the network.

Problem 3

Question :

3. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

Group of answer choices :

VTY interface
console interface
Ethernet interface
boot IOS mode
privileged EXEC mode
router configuration mode

Correct Answer :

VTY interface
console interface
privileged EXEC mode

Explanation :

Refer to curriculum topic: 2.2.2
Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes.

 

Problem 4

Question :

4. What command will prevent all unencrypted passwords from displaying in plain text in a configuration file ?

Answer Option Choices :

Group of answer choices
(config)# enable password secret
(config)# enable secret Secret_Password
(config-line)# password secret
(config)# service password-encryption
(config)# enable secret Encrypted_Password

Correct Answer :

(config)# service password-encryption

Explanation :

Refer to curriculum topic: 2.2.2
To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file.

 

Problem 5

Question :

5. When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

Answer Option Choices :

Group of answer choices
the hostname should be fewer than 64 characters in length
the hostname should be written in all lower case characters
the hostname should contain no spaces
the hostname should end with a special character
the hostname should begin with a letter

Correct Answer :

the hostname should be fewer than 64 characters in length
the hostname should contain no spaces
the hostname should begin with a letter

Explanation :

Refer to curriculum topic: 2.2.1
A hostname can be configured with upper or lower case characters and should end with a letter or digit, not a special character. A hostname should start with a letter and no space is allowed for a hostname.

 

Problem 6

Question :

6. True or False?
Mobile devices do not require IP addresses to communicate on the Internet.

Answer Option Choices :

Group of answer choices
True
False

Correct Answer :

False

Refer to curriculum topic: 2.3.1
All devices that communicate over data networks need unique IP addresses.

 

Problem 7

Question :

Fill in the blank.
The component of the operating software that provides the user interface is called the .

Correct Answer :

shell

Explanation :

Refer to curriculum topic: 2.1.1
Operating systems function with a shell, a kernel, and the hardware. The shell interfaces with the users, allowing them to request specific tasks from the device. The kernel provisions resources from the hardware to meet software requirements. The hardware functions by using drivers and their underlying electronics. The hardware represents the physical components of the device.

 

Problem 8

Question :

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

Group of answer choices

Copy the running configuration to the startup configuration file.
Copy the information in the startup configuration file to the running configuration.
Reload the device and type yes when prompted to save the configuration.
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

Correct Answer :

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

Explanation :

Refer to curriculum topic: 2.2.3
Changes to router and switch configurations take effect as soon as the command is entered. For this reason, it is very important that changes to live production devices are always carefully planned before being implemented. If commands are entered that render the device unstable or inaccessible, the device may have to be reloaded, resulting in network downtime.

 

Problem 9

Question :

Why would a technician enter the command copy startup-config running-config?

Group of answer choices
to remove all configurations from the switch
to save an active configuration to NVRAM
to copy an existing configuration into RAM
to make a changed configuration the new startup configuration

Correct Answer :

to copy an existing configuration into RAM

Explanation :

Refer to curriculum topic: 2.2.3
Usually, changes are made to a running configuration in RAM and copied to NVRAM. However, in this case, the technician wants to copy a previously saved configuration from NVRAM into RAM in order to make changes to it.

 

Problem 10

Question :

To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
Group of answer choices
Tab
Ctrl-P
Ctrl-N
Up Arrow
Right Arrow
Down Arrow

Correct Answer :

Tab

Explanation :

Refer to curriculum topic: 2.1.4

 

Problem 11

Question :

Fill in the blank.
In order to test end-to-end connectivity, you would use the command .

Correct Answer :

ping

Explanation :

Refer to curriculum topic: 2.3.3
Connectivity between two end devices can be tested using the ping, tracert, or traceroute commands.

 

Problem 12

Question :

Which two statements are true regarding the user EXEC mode? (Choose two.)

Group of answer choices

All router commands are available.
Global configuration mode can be accessed by entering the enable command.
The device prompt for this mode ends with the “>” symbol.
Interfaces and routing protocols can be configured.
Only some aspects of the router configuration can be viewed.

Correct Answer :

The device prompt for this mode ends with the “>” symbol.

Only some aspects of the router configuration can be viewed.

Explanation :

Refer to curriculum topic: 2.1.3
User EXEC mode limits access to some show and debug commands. It is the first level of user interface encountered when configuring a router and is intended for investigation of certain functions of the device. The User EXEC prompt is identified with the “>” symbol.

 

Problem 13

Question :

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

Group of answer choices :

providing an error message when a wrong command is submitted
displaying a list of all available commands within the current mode
allowing the user to complete the remainder of an abbreviated command with the TAB key
determining which option, keyword, or argument is available for the entered command
selecting the best command to accomplish a task

Correct Answer :

The device prompt for this mode ends with the “>” symbol.

Only some aspects of the router configuration can be viewed.

Explanation :

Refer to curriculum topic: 2.1.4
Context-sensitive help provides the user with a list of commands and the arguments associated with those commands within the current mode of a networking device. A syntax checker provides error checks on submitted commands and the TAB key can be used for command completion if a partial command is entered.

 

Problem 14

An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect to the LAN, the employee receives a duplicate IP address error message. What can the company do to prevent this situation from arising again?
Group of answer choices :
Configure the IP address on an SVI on the laptop.
Use a virtual private network instead of the company LAN.
Use DHCP to automatically assign addresses.
Use laptops that do not require IP addresses.

Correct Answer :

Use DHCP to automatically assign addresses.

 

Problem 15

How is SSH different from Telnet?
Group of answer choices :
SSH makes connections over the network, whereas Telnet is for out-of-band access.
SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.
SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through the use of Telnet.
SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a console connection.

Correct Answer :

SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.

One thought on “Cisco CCNA 1 Routing and Switching : Configure a Network Operating System Chapter 2 Quiz 2

Leave a Reply