0% found this document useful (0 votes)
13 views6 pages

Module 1 3

The document outlines various networking concepts, including characteristics of Switched Virtual Interfaces (SVIs), the function of the service password-encryption command, and the use of passwords for securing Cisco IOS access. It also discusses the differences between SSH and Telnet, the implications of network configurations on security, and the TCP/IP encapsulation process. Additionally, it addresses specific commands and key combinations used in Cisco networking environments.

Uploaded by

nhatdz2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views6 pages

Module 1 3

The document outlines various networking concepts, including characteristics of Switched Virtual Interfaces (SVIs), the function of the service password-encryption command, and the use of passwords for securing Cisco IOS access. It also discusses the differences between SSH and Telnet, the implications of network configurations on security, and the TCP/IP encapsulation process. Additionally, it addresses specific commands and key combinations used in Cisco networking environments.

Uploaded by

nhatdz2005
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

1 What are three characteristics of an SVI? (Choose three.

)
1What are three characteristics of an SVI? (Choose three.)
 It is a special interface that allows connectivity by different types of media.
 It is associated with VLAN1 by default.
 It is not associated with any physical interface on a switch.
 It provides a means to remotely manage a switch.
 It is designed as a security protocol to protect switch ports.
 It is required to allow connectivity by any device at any location.

2A network administrator enters the service password-encryption command into the


configuration mode of a router. What does this command accomplish?
 This command enables a strong encryption algorithm for the enable secret password command.
 This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.
 This command encrypts passwords as they are transmitted across serial WAN links.
 This command provides an exclusive encrypted password for external service personnel who are required to
do router maintenance.
 This command prevents someone from viewing the running configuration passwords.
 Navigation Bar

3 Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can
be protected with passwords. (Choose three.)
3Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the
modes and interfaces that can be protected with passwords. (Choose three.)
 VTY interface
 router configuration mode
 console interface
 privileged EXEC mode
 boot IOS mode
 Ethernet interface
8 While trying to solve a network issue, a technician made multiple changes to the current router configuration file.
The changes did not solve the problem and were not saved. What action can the technician take to discard the
changes and work with the file in NVRAM?
8While trying to solve a network issue, a technician made multiple changes to the
current router configuration file. The changes did not solve the problem and were not
saved. What action can the technician take to discard the changes and work with the
file in NVRAM?
 Issue the copy startup-config running-config command.
 Close and reopen the terminal emulation software.
 Delete the vlan.dat file and reboot the device.
 Issue the reload command without saving the running configuration.

9 Which command or key combination allows a user to return to the previous level in the command hierarchy?
9Which command or key combination allows a user to return to the previous
level in the command hierarchy?
 Ctrl-C
 exit
 end
 Ctrl-Z
 Navigation Bar

10 What function does pressing the Tab key have when entering a command in IOS?
10What function does pressing the Tab key have when entering a command in IOS?
 It completes the remainder of a partially typed word in a command.
 It aborts the current command and returns to configuration mode.
 It moves the cursor to the beginning of the next line.
 It exits configuration mode and returns to user EXEC mode.

11 What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a
configured IP address?
11What command is used to verify the condition of the switch interfaces, including
the status of the interfaces and a configured IP address?
 traceroute
 ping
 ipconfig
 show ip interface brief

12 An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the
purpose of using these keystrokes?
12An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing
the ping command. What is the purpose of using these keystrokes?
 to restart the ping process
 to interrupt the ping process
 to exit to a different configuration mode
 to allow the user to complete the command

13 How is SSH different from Telnet?


13How is SSH different from Telnet?
 SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a
console connection.
 SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered
insecure and sends messages in plaintext.
 SSH makes connections over the network, whereas Telnet is for out-of-band access.
 SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through
the use of Telnet.
14 An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to
access confidential pricing information from internal servers at the Head Office. What type of network would the
employee access?
14An employee at a branch office is creating a quote for a customer. In order to do
this, the employee needs to access confidential pricing information from internal
servers at the Head Office. What type of network would the employee access?
 a local area network
 an extranet
 an intranet
 the Internet

15 A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up
the wireless network so that patients can see the medical records data of other patients. Which of the four network
characteristics has been violated in this situation?
15A networking technician is working on the wireless network at a medical clinic.
The technician accidentally sets up the wireless network so that patients can see the
medical records data of other patients. Which of the four network characteristics has
been violated in this situation?
 scalability
 fault tolerance
 security
 reliability
 Quality of Service (QoS)

16Which statement describes the use of powerline networking technology?


 A home LAN is installed without the use of physical cabling.
 Wireless access points use powerline adapters to distribute data through the home LAN.
 A device connects to an existing home LAN using an adapter and an existing electrical outlet.
 New "smart" electrical cabling is used to extend an existing home LAN.

17 Which name is assigned to the transport layer PDU?


17Which name is assigned to the transport layer PDU?
 packet
 segment
 bits
 data
 frame

18 Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?
18Which statement accurately describes a TCP/IP encapsulation process when a PC is
sending data to the network?
 Frames are sent from the network access layer to the internet layer.
 Segments are sent from the transport layer to the internet layer.
 Packets are sent from the network access layer to the transport layer.
 Data is sent from the internet layer to the network access layer.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy