Module 1 3
Module 1 3
)
1What are three characteristics of an SVI? (Choose three.)
It is a special interface that allows connectivity by different types of media.
It is associated with VLAN1 by default.
It is not associated with any physical interface on a switch.
It provides a means to remotely manage a switch.
It is designed as a security protocol to protect switch ports.
It is required to allow connectivity by any device at any location.
3 Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can
be protected with passwords. (Choose three.)
3Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the
modes and interfaces that can be protected with passwords. (Choose three.)
VTY interface
router configuration mode
console interface
privileged EXEC mode
boot IOS mode
Ethernet interface
8 While trying to solve a network issue, a technician made multiple changes to the current router configuration file.
The changes did not solve the problem and were not saved. What action can the technician take to discard the
changes and work with the file in NVRAM?
8While trying to solve a network issue, a technician made multiple changes to the
current router configuration file. The changes did not solve the problem and were not
saved. What action can the technician take to discard the changes and work with the
file in NVRAM?
Issue the copy startup-config running-config command.
Close and reopen the terminal emulation software.
Delete the vlan.dat file and reboot the device.
Issue the reload command without saving the running configuration.
9 Which command or key combination allows a user to return to the previous level in the command hierarchy?
9Which command or key combination allows a user to return to the previous
level in the command hierarchy?
Ctrl-C
exit
end
Ctrl-Z
Navigation Bar
10 What function does pressing the Tab key have when entering a command in IOS?
10What function does pressing the Tab key have when entering a command in IOS?
It completes the remainder of a partially typed word in a command.
It aborts the current command and returns to configuration mode.
It moves the cursor to the beginning of the next line.
It exits configuration mode and returns to user EXEC mode.
11 What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a
configured IP address?
11What command is used to verify the condition of the switch interfaces, including
the status of the interfaces and a configured IP address?
traceroute
ping
ipconfig
show ip interface brief
12 An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the
purpose of using these keystrokes?
12An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing
the ping command. What is the purpose of using these keystrokes?
to restart the ping process
to interrupt the ping process
to exit to a different configuration mode
to allow the user to complete the command
15 A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up
the wireless network so that patients can see the medical records data of other patients. Which of the four network
characteristics has been violated in this situation?
15A networking technician is working on the wireless network at a medical clinic.
The technician accidentally sets up the wireless network so that patients can see the
medical records data of other patients. Which of the four network characteristics has
been violated in this situation?
scalability
fault tolerance
security
reliability
Quality of Service (QoS)
18 Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?
18Which statement accurately describes a TCP/IP encapsulation process when a PC is
sending data to the network?
Frames are sent from the network access layer to the internet layer.
Segments are sent from the transport layer to the internet layer.
Packets are sent from the network access layer to the transport layer.
Data is sent from the internet layer to the network access layer.