ccna 1 Chapter 2 v5 0 Answers
ccna 1 Chapter 2 v5 0 Answers
0 answers
ccnav5.com /ccna-1-chapter-2-v5-0-answers/
Share
CCNA 1 Chapter 2 v5.0 answers Routing and SWitching Introduction to Networking, CISCO CCNA
quIZ T EST ANSWERS, CCNA CH 2 2014
1.
Ref er to the exhibit. A switch was conf igured as shown. A ping to the def ault gateway was issued,
but the ping was not successf ul. Other switches in the same network can ping this gateway. What
is a possible reason f or this?
1. T he def ault gateway address must be 192.168.10.1. 2. T he ip def ault-gateway command has to
be issued in the VLAN interf ace conf iguration mode. 3. T he VLAN IP address and the def ault
gateway IP address are not in the same network.4. T he no shutdown command was not
issued for VLAN 1.
5. T he local DNS server is not f unctioning correctly.
2. While trying to solve a network issue, a technician made multiple changes to the current router
conf iguration f ile. T he changes did not solve the problem and were not saved. What action can
the technician take to discard the changes and work with the f ile in NVRAM?
1. to allow local access to the device through the console port 2. a Cisco router or switch only
begins to operate when its hostname is set 3. to identify the device during remote access
(SSH or telnet)
4. a hostname must be conf igured bef ore any other parameters
4. Which procedure is used to access a Cisco 2960 switch when perf orming an initial
conf iguration in a secure environment?
1. Use the console port to locally access the switch from a serial or USB interface of the
PC.
2. Use Secure Shell to remotely access the switch through the network.
3. Use Telnet to remotely access the switch through the network.
4. Use the AUX port to locally access the switch f rom a serial or USB interf ace of the PC.
5. What criterion must be f ollowed in the design of an IPv4 addressing scheme f or end devices?
1. Each local host should be assigned an IP address with a unique network component. 2. Each IP
address must match the address that is assigned to the host by DNS.3. Each IP address must
be unique within the local network.
4. Each IP address needs to be compatible with the MAC address.
6. A network administrator needs to keep the user ID, password, and session contents private
when establishing remote CLI connectivity with a switch to manage it. Which access method
should be chosen?
1. AUX 2. SSH
3. Console
4. Telnet
1. All passwords in the configuration are not shown in clear text when viewing the
configuration.
2. T he command encrypts the banner message.
3. T he command encrypts the enable mode password.
4. A network administrator who later logs into the device will be required to enter an administrator
password in order to gain access to the Cisco device.
9. Match the dif initions to their respective CLI hot keys and shortcuts (Not all options are used)
Tab -> Completes abbreviated commands and parameters Ctrl-R -> returns directly to the
privileged EXEC mode Up Arrow -> scrolls backwards through previously entered commands Ctrl-
Z -> cancels any command currently being entered and returns directly to privileged EXEC mode
Ctrl-C -> Redisplays, on a new line, the command currently being typed
10. A network administrator is planning an IOS upgrade on several of the head of f ice routers and
switches. Which three questions must be answered bef ore continuing with the IOS selection and
upgrade? (Choose three.)
1. Hosts can connect to the network and get an IP address without manual configuration.
2. Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP
and has static assignments.
3. DHCP allows users to ref er to locations by a name rather than an IP address.
4. Hosts always have the same IP address and are theref ore always reachable.
12. Which two f unctions are provided to users by the context-sensitive help f eature of the Cisco
IOS CLI? (Choose two.)
1. providing an error message when a wrong command is submitted 2. allowing the user to
complete the remainder of an abbreviated command with the TAB key3. displaying a list of all
available commands within the current mode
4. selecting the best command to accomplish a task
5. determining which option, keyword, or argument is available for the entered command
13. A router has a valid operating system and a conf iguration stored in NVRAM. When the router
boots up, which mode will display?
14. Which two f eatures are characteristics of f lash memory? (Choose two.)
1. Flash receives a copy of the IOS f rom RAM when a device is powered on.2. Flash provides
nonvolatile storage.
3. T he contents of flash may be overwritten.
4. Flash is a component in Cisco switches but not in Cisco routers.
5. T he contents of f lash may be lost during a power cycle.
15. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes
and interf aces that can be protected with passwords. (Choose three.)
1. to enable the switch to send broadcast f rames to attached PCs 2. to enable the switch to
f unction as a def ault gateway 3. to enable the switch to receive f rames f rom attached PCs 4. to
enable the switch to be managed remotely
17. What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?1. if there
is connectivity with the destination device
2. what type of device is at the destination
3. if the T CP/IP stack is f unctioning on the PC without putting traf f ic on the wire
4. the path that traf f ic will take to reach the destination
18. What command can be used on a Windows PC to see the IP conf iguration of that computer?
1. ping 2. show interf aces 3. show ip interf ace brief 4. ipconfig
19. Which statement is true about the running conf iguration f ile in a Cisco IOS device? 1. It should
be deleted using the erase running-conf ig command. 2. It is automatically saved when the router
reboots.3. It affects the operation of the device immediately when modified.
4. It is stored in NVRAM.
20. Match the description to the common IOS CLI access method (Not all options are used)
Virtual interf ace – Target (Y)->It requires an active network connection. (Y) AUX port – Target (X)
-> It connects through dialup connections. (X) AUX port – Target (Y) -> It is not supported on
Catalyst switch devices. (Y) Virtual interf ace – Target (X) -> It uses Telnet or SSH protocols f or
access. (X) Console port – Target (X) -> It displays startup, debugging, and error messages by
def ault. (X) Console port – Target (Y) -> It can be used to restore an out-of -box conf iguration on
a switch or router. (Y)
21. Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.)
1. tab 2. space 3. question mark4. numbers
5. underline
22. A new network administrator has been asked to enter a banner message on a Cisco device.
What is the f astest way a network administrator could test whether the banner is properly
conf igured? 1. Power cycle the device. 2. Enter CT RL-Z at the privileged mode prompt. 3. Exit
global conf iguration mode.4. Exit enable mode and press Enter.
5. Reboot the device.