0% found this document useful (0 votes)
39 views4 pages

ccna 1 Chapter 2 v5 0 Answers

The document provides answers to questions about CCNA 1 Chapter 2 v5.0. It includes 21 multiple choice questions about networking and Cisco device configuration. Some of the questions cover topics like IP addressing, DHCP, passwords, IOS upgrades, and banner messages.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views4 pages

ccna 1 Chapter 2 v5 0 Answers

The document provides answers to questions about CCNA 1 Chapter 2 v5.0. It includes 21 multiple choice questions about networking and Cisco device configuration. Some of the questions cover topics like IP addressing, DHCP, passwords, IOS upgrades, and banner messages.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CCNA 1 Chapter 2 v5.

0 answers
ccnav5.com /ccna-1-chapter-2-v5-0-answers/

Share

CCNA 1 Chapter 2 v5.0 answers Routing and SWitching Introduction to Networking, CISCO CCNA
quIZ T EST ANSWERS, CCNA CH 2 2014

1.

Ref er to the exhibit. A switch was conf igured as shown. A ping to the def ault gateway was issued,
but the ping was not successf ul. Other switches in the same network can ping this gateway. What
is a possible reason f or this?

1. T he def ault gateway address must be 192.168.10.1. 2. T he ip def ault-gateway command has to
be issued in the VLAN interf ace conf iguration mode. 3. T he VLAN IP address and the def ault
gateway IP address are not in the same network.4. T he no shutdown command was not
issued for VLAN 1.
5. T he local DNS server is not f unctioning correctly.

2. While trying to solve a network issue, a technician made multiple changes to the current router
conf iguration f ile. T he changes did not solve the problem and were not saved. What action can
the technician take to discard the changes and work with the f ile in NVRAM?

1. Issue the reload command without saving the running configuration.


2. Close and reopen the terminal emulation sof tware.
3. Delete the vlan.dat f ile and reboot the device.
4. Issue the copy startup-conf ig running-conf ig command.

3. Why is it important to conf igure a hostname on a device?

1. to allow local access to the device through the console port 2. a Cisco router or switch only
begins to operate when its hostname is set 3. to identify the device during remote access
(SSH or telnet)
4. a hostname must be conf igured bef ore any other parameters

4. Which procedure is used to access a Cisco 2960 switch when perf orming an initial
conf iguration in a secure environment?

1. Use the console port to locally access the switch from a serial or USB interface of the
PC.
2. Use Secure Shell to remotely access the switch through the network.
3. Use Telnet to remotely access the switch through the network.
4. Use the AUX port to locally access the switch f rom a serial or USB interf ace of the PC.

5. What criterion must be f ollowed in the design of an IPv4 addressing scheme f or end devices?

1. Each local host should be assigned an IP address with a unique network component. 2. Each IP
address must match the address that is assigned to the host by DNS.3. Each IP address must
be unique within the local network.
4. Each IP address needs to be compatible with the MAC address.

6. A network administrator needs to keep the user ID, password, and session contents private
when establishing remote CLI connectivity with a switch to manage it. Which access method
should be chosen?

1. AUX 2. SSH
3. Console
4. Telnet

7. Which interf ace allows remote management of a Layer 2 switch?

1. the switch virtual interface


2. the console port interf ace
3. the AUX interf ace
4. the f irst Ethernet port interf ace

8. What is a result of using the service password-encryption command on a Cisco network


device?

1. All passwords in the configuration are not shown in clear text when viewing the
configuration.
2. T he command encrypts the banner message.
3. T he command encrypts the enable mode password.
4. A network administrator who later logs into the device will be required to enter an administrator
password in order to gain access to the Cisco device.

9. Match the dif initions to their respective CLI hot keys and shortcuts (Not all options are used)

Tab -> Completes abbreviated commands and parameters Ctrl-R -> returns directly to the
privileged EXEC mode Up Arrow -> scrolls backwards through previously entered commands Ctrl-
Z -> cancels any command currently being entered and returns directly to privileged EXEC mode
Ctrl-C -> Redisplays, on a new line, the command currently being typed

10. A network administrator is planning an IOS upgrade on several of the head of f ice routers and
switches. Which three questions must be answered bef ore continuing with the IOS selection and
upgrade? (Choose three.)

1. What models of routers and switches require upgrades?


2. Do the routers and switches have enough RAM and flash memory for the proposed IOS
versions?
3. What ports are installed on the routers and switches?
4. Are the devices on the same LAN?
5. What features are required for the devices?
6. Do the devices have enough NVRAM to store the IOS image?

11. What benef it does DHCP provide to a network?

1. Hosts can connect to the network and get an IP address without manual configuration.
2. Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP
and has static assignments.
3. DHCP allows users to ref er to locations by a name rather than an IP address.
4. Hosts always have the same IP address and are theref ore always reachable.

12. Which two f unctions are provided to users by the context-sensitive help f eature of the Cisco
IOS CLI? (Choose two.)

1. providing an error message when a wrong command is submitted 2. allowing the user to
complete the remainder of an abbreviated command with the TAB key3. displaying a list of all
available commands within the current mode
4. selecting the best command to accomplish a task
5. determining which option, keyword, or argument is available for the entered command

13. A router has a valid operating system and a conf iguration stored in NVRAM. When the router
boots up, which mode will display?

1. global conf iguration mode2. user EXEC mode


3. setup mode
4. ROM monitor mode

14. Which two f eatures are characteristics of f lash memory? (Choose two.)

1. Flash receives a copy of the IOS f rom RAM when a device is powered on.2. Flash provides
nonvolatile storage.
3. T he contents of flash may be overwritten.
4. Flash is a component in Cisco switches but not in Cisco routers.
5. T he contents of f lash may be lost during a power cycle.

15. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes
and interf aces that can be protected with passwords. (Choose three.)

1. boot IOS mode 2. Ethernet interf ace 3. privileged EXEC mode


4. VT Y interface
5. console interface
6. router conf iguration mode

16. Why would a Layer 2 switch need an IP address?

1. to enable the switch to send broadcast f rames to attached PCs 2. to enable the switch to
f unction as a def ault gateway 3. to enable the switch to receive f rames f rom attached PCs 4. to
enable the switch to be managed remotely

17. What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?1. if there
is connectivity with the destination device
2. what type of device is at the destination
3. if the T CP/IP stack is f unctioning on the PC without putting traf f ic on the wire
4. the path that traf f ic will take to reach the destination
18. What command can be used on a Windows PC to see the IP conf iguration of that computer?
1. ping 2. show interf aces 3. show ip interf ace brief 4. ipconfig

19. Which statement is true about the running conf iguration f ile in a Cisco IOS device? 1. It should
be deleted using the erase running-conf ig command. 2. It is automatically saved when the router
reboots.3. It affects the operation of the device immediately when modified.
4. It is stored in NVRAM.

20. Match the description to the common IOS CLI access method (Not all options are used)

Virtual interf ace – Target (Y)->It requires an active network connection. (Y) AUX port – Target (X)
-> It connects through dialup connections. (X) AUX port – Target (Y) -> It is not supported on
Catalyst switch devices. (Y) Virtual interf ace – Target (X) -> It uses Telnet or SSH protocols f or
access. (X) Console port – Target (X) -> It displays startup, debugging, and error messages by
def ault. (X) Console port – Target (Y) -> It can be used to restore an out-of -box conf iguration on
a switch or router. (Y)

21. Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.)
1. tab 2. space 3. question mark4. numbers
5. underline

22. A new network administrator has been asked to enter a banner message on a Cisco device.
What is the f astest way a network administrator could test whether the banner is properly
conf igured? 1. Power cycle the device. 2. Enter CT RL-Z at the privileged mode prompt. 3. Exit
global conf iguration mode.4. Exit enable mode and press Enter.
5. Reboot the device.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy