Professional Documents
Culture Documents
2 / 2 pts
A technician configures a switch with these commands:
SwitchA(config)# interface vlan 1
SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown
What is the technician configuring?
Telnet access
Correct!
SVI
password encryption
Question 2
2 / 2 pts
When a hostname is configured through the Cisco CLI, which three naming conventions are part of
the guidelines? (Choose three.)
Correct!
Question 3
2 / 2 pts
An IT technician has manually configured an IP address on a laptop for a new employee. Each time
the employee tries to connect to the LAN, the employee receives a duplicate IP address error
message. What can the company do to prevent this situation from arising again?
Correct!
Question 4
2 / 2 pts
Fill in the blank.
The component of the operating software that provides the user interface is called the
.
shell
Answer 1:
Correct!shell
Refer to curriculum topic: 2.1.1
Operating systems function with a shell, a kernel, and the hardware. The shell interfaces with the
users, allowing them to request specific tasks from the device. The kernel provisions resources from
the hardware to meet software requirements. The hardware functions by using drivers and their
underlying electronics. The hardware represents the physical components of the device.
Question 5
2 / 2 pts
An administrator has just changed the IP address of an interface on an IOS device. What else must
be done in order to apply those changes to the device?
Copy the information in the startup configuration file to the running configuration.
Reload the device and type yes when prompted to save the configuration.
Correct!
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the
command is typed correctly and the Enter key has been pressed.
Refer to curriculum topic: 2.2.3
Changes to router and switch configurations take effect as soon as the command is entered. For this
reason, it is very important that changes to live production devices are always carefully planned
before being implemented. If commands are entered that render the device unstable or inaccessible,
the device may have to be reloaded, resulting in network downtime.
Question 6
2 / 2 pts
To save time, IOS commands may be partially entered and then completed by typing which key or
key combination?
Correct!
Tab
Ctrl-P
Ctrl-N
Up Arrow
Right Arrow
Down Arrow
Refer to curriculum topic: 2.1.4
Question 7
2 / 2 pts
Why would a technician enter the command copy startup-config running-config?
Question 8
2 / 2 pts
command.
ping
Answer 1:
Correct!ping
Correct Answer
trace
Correct Answer
traceroute
Correct Answer
tracert
Refer to curriculum topic: 2.3.3
Connectivity between two end devices can be tested using the ping, tracert,
or traceroute commands.
Question 9
2 / 2 pts
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS
CLI? (Choose two.)
allowing the user to complete the remainder of an abbreviated command with the TAB key
Correct!
determining which option, keyword, or argument is available for the entered command
Question 10
2 / 2 pts
How is SSH different from Telnet?
SSH makes connections over the network, whereas Telnet is for out-of-band access.
Correct!
SSH provides security to remote sessions by encrypting messages and using user authentication.
Telnet is considered insecure and sends messages in plaintext.
SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect
to devices through the use of Telnet.
SSH must be configured over an active network connection, whereas Telnet is used to connect to a
device from a console connection.
Refer to curriculum topic: 2.1.2
SSH is the preferred protocol for connecting to a device operating system over the network because
it is much more secure than Telnet. Both SSH and Telnet are used to connect to devices over the
network, and so are both used in-band. PuTTY and Terra Term can be used to make both SSH and
Telnet connections.
Question 11
2 / 2 pts
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and
interfaces that can be protected with passwords. (Choose three.)
Correct!
VTY interface
Correct!
console interface
Ethernet interface
Question 12
2 / 2 pts
Which device acts as a gateway to allow hosts to send traffic to remote IP networks?
DNS server
DHCP server
Correct!
local router
local switch
Refer to curriculum topic: 2.3.1
For hosts to reach remote networks, they must send traffic to a local router that can route the traffic
to the correct destination network. This local router is known as the default gateway and hosts must
be configured with this address in order to communicate with devices on remote networks.
Question 13
2 / 2 pts
Which two statements are true regarding the user EXEC mode? (Choose two.)
The device prompt for this mode ends with the ">" symbol.
Question 14
2 / 2 pts
What command will prevent all unencrypted passwords from displaying in plain text in a configuration
file?
administrator can execute the service password-encryption command. This command encrypts all
configured passwords in the configuration file.
Question 15
2 / 2 pts
True or False?
Mobile devices do not require IP addresses to communicate on the Internet.
True
Correct!
False
Refer to curriculum topic: 2.3.1
All devices that communicate over data networks need unique IP addresses.