Last Updated on November 29, 2018 by Admin
Introduction to Networks (version 6.00) – ITN Chapter 2 Exam Beta Online 2018 100%
ITN -- Chapter 2 Exam Beta
Quiz-summary
0 of 31 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
Information
ITN -- Chapter 2 Exam Beta
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 31 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- 31
- Answered
- Review
-
Question 1 of 31
1. Question
1 pointsA network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?Correct
Incorrect
Operating systems function with a shell, a kernel, and the hardware. The shell interfaces with the users, allowing them to request specific tasks from the device. The kernel provisions resources from the hardware to meet software requirements. The hardware functions by using drivers and their underlying electronics. The hardware represents the physical components of the device.Hint
To be truly private a technician would use a Console connection however if remote management is required SSH provides a secure method. -
Question 2 of 31
2. Question
1 pointsWhich procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?Correct
Incorrect
Telnet and SSH require active networking services to be configured on a Cisco device before they become functional. Cisco switches do not contain AUX ports.Hint
Telnet and SSH require active networking services to be configured on a Cisco device before they become functional. Cisco switches do not contain AUX ports. -
Question 3 of 31
3. Question
2 pointsWhich two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)Correct
Incorrect
Context-sensitive help provides the user with a list of commands and the arguments associated with those commands within the current mode of a networking device. A syntax checker provides error checks on submitted commands and the TAB key can be used for command completion if a partial command is entered.Hint
Context-sensitive help provides the user with a list of commands and the arguments associated with those commands within the current mode of a networking device. A syntax checker provides error checks on submitted commands and the TAB key can be used for command completion if a partial command is entered. -
Question 4 of 31
4. Question
1 pointsIn the show running-config command, which part of the syntax is represented by running-config?Correct
Incorrect
The first part of the syntax, show, is the command, and the second part of the syntax, running-config, is the keyword. The keyword specifies what should be displayed as the output of the show command.Hint
The first part of the syntax, show, is the command, and the second part of the syntax, running-config, is the keyword. The keyword specifies what should be displayed as the output of the show command. -
Question 5 of 31
5. Question
1 pointsWhich information does the show startup-config command display?Correct
Incorrect
The show startup-config command displays the saved configuration located in NVRAM. The show running-config command displays the contents of the currently running configuration file located in RAM.Hint
The show startup-config command displays the saved configuration located in NVRAM. The show running-config command displays the contents of the currently running configuration file located in RAM. -
Question 6 of 31
6. Question
1 pointsWhich command or key combination allows a user to return to the previous level in the command hierarchy?Correct
Incorrect
End and CTRL-Z return the user to the privileged EXEC mode. Ctrl-C ends a command in process. The exit command returns the user to the previous level.Hint
End and CTRL-Z return the user to the privileged EXEC mode. Ctrl-C ends a command in process. The exit command returns the user to the previous level. -
Question 7 of 31
7. Question
1 pointsHow is SSH different from Telnet?Correct
Incorrect
SSH is the preferred protocol for connecting to a device operating system over the network because it is much more secure than Telnet. Both SSH and Telnet are used to connect to devices over the network, and so are both used in-band. PuTTY and Terra Term can be used to make both SSH and Telnet connections.Hint
SSH is the preferred protocol for connecting to a device operating system over the network because it is much more secure than Telnet. Both SSH and Telnet are used to connect to devices over the network, and so are both used in-band. PuTTY and Terra Term can be used to make both SSH and Telnet connections. -
Question 8 of 31
8. Question
1 pointsA router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?Correct
Incorrect
If a Cisco IOS device has a valid IOS and a valid configuration file, it will boot into user EXEC mode. A password will be required to enter privileged EXEC mode.Hint
If a Cisco IOS device has a valid IOS and a valid configuration file, it will boot into user EXEC mode. A password will be required to enter privileged EXEC mode. -
Question 9 of 31
9. Question
1 pointsWhat is the function of the kernel of an operating system?Correct
Incorrect
Operating systems function with a shell, a kernel, and the hardware. The shell interfaces with the users, allowing them to request specific tasks from the device. The kernel provisions resources from the hardware to meet software requirements. The hardware functions by using drivers and their underlying electronics. The hardware represents the physical components of the device.Hint
Operating systems function with a shell, a kernel, and the hardware. The shell interfaces with the users, allowing them to request specific tasks from the device. The kernel provisions resources from the hardware to meet software requirements. The hardware functions by using drivers and their underlying electronics. The hardware represents the physical components of the device. -
Question 10 of 31
10. Question
3 pointsPasswords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)Correct
Incorrect
Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes.Hint
Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes. -
Question 11 of 31
11. Question
1 pointsWhich statement is true about the running configuration file in a Cisco IOS device?Correct
Incorrect
As soon as configuration commands are entered into a router, they modify the device immediately. Running configuration files can not be deleted nor are they saved automatically.Hint
As soon as configuration commands are entered into a router, they modify the device immediately. Running configuration files can not be deleted nor are they saved automatically. -
Question 12 of 31
12. Question
1 pointsHow does the service password-encryption command enhance password security on Cisco routers and switches?Correct
Incorrect
The service password-encryption command encrypts plaintext passwords in the configuration file so that they cannot be viewed by unauthorized users.Hint
The service password-encryption command encrypts plaintext passwords in the configuration file so that they cannot be viewed by unauthorized users. -
Question 13 of 31
13. Question
1 pointsRefer to the exhibit. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?Correct
Incorrect
A banner message can be an important part of the legal process in the event that someone is prosecuted for breaking into a device. A banner message should make it clear that only authorized personnel should attempt to access the device. However, the banner command does not prevent unauthorized entry.Hint
A banner message can be an important part of the legal process in the event that someone is prosecuted for breaking into a device. A banner message should make it clear that only authorized personnel should attempt to access the device. However, the banner command does not prevent unauthorized entry. -
Question 14 of 31
14. Question
1 pointsWhy is it important to configure a hostname on a device?Correct
Incorrect
It is important to configure a hostname because various authentication processes use the device hostname. Hostnames are helpful for documentation, and they identify the device during remote access.Hint
It is important to configure a hostname because various authentication processes use the device hostname. Hostnames are helpful for documentation, and they identify the device during remote access. -
Question 15 of 31
15. Question
2 pointsWhat are two characteristics of RAM on a Cisco device? (Choose two.)Correct
Incorrect
RAM stores data that is used by the device to support network operations. The running configuration is stored in RAM. This type of memory is considered volatile memory because data is lost during a power cycle. Flash memory stores the IOS and delivers a copy of the IOS into RAM when a device is powered on. Flash memory is nonvolatile since it retains stored contents during a loss of power.Hint
RAM stores data that is used by the device to support network operations. The running configuration is stored in RAM. This type of memory is considered volatile memory because data is lost during a power cycle. Flash memory stores the IOS and delivers a copy of the IOS into RAM when a device is powered on. Flash memory is nonvolatile since it retains stored contents during a loss of power. -
Question 16 of 31
16. Question
2 pointsWhich two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)Correct
Incorrect
Some guidelines for naming conventions are that names should:
- Start with a letter
- Contain no spaces
- End with a letter or digit
- Use only letters, digits, and dashes
- Be less than 64 characters in length
Hint
Some guidelines for naming conventions are that names should:- Start with a letter
- Contain no spaces
- End with a letter or digit
- Use only letters, digits, and dashes
- Be less than 64 characters in length
-
Question 17 of 31
17. Question
1 pointsWhich passwords are encrypted with the service password encryption command?Correct
Incorrect
By using the service password encryption global configuration mode command, all passwords in the configuration file are encrypted so they cannot be viewed by unauthorized individuals.Hint
By using the service password encryption global configuration mode command, all passwords in the configuration file are encrypted so they cannot be viewed by unauthorized individuals. -
Question 18 of 31
18. Question
1 pointsWhich type of access is secured on a Cisco router or switch with the enable secret command?Correct
Incorrect
The enable secret command secures access to the privileged EXEC mode of a Cisco router or switch.Hint
The enable secret command secures access to the privileged EXEC mode of a Cisco router or switch. -
Question 19 of 31
19. Question
1 pointsWhich memory location on a Cisco router or switch stores the startup configuration file?Correct
Incorrect
The startup configuration file of a Cisco router or switch is stored in NVRAM, which is nonvolatile memory.Hint
The startup configuration file of a Cisco router or switch is stored in NVRAM, which is nonvolatile memory. -
Question 20 of 31
20. Question
1 pointsWhich memory location on a Cisco router or switch will lose all content when the device is restarted?Correct
Incorrect
RAM is volatile memory and will lose all contents if the router or switch is restarted or shutdown.Hint
RAM is volatile memory and will lose all contents if the router or switch is restarted or shutdown. -
Question 21 of 31
21. Question
1 pointsWhat is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?Correct
Incorrect
The ping destination command can be used to test connectivity.Hint
The ping destination command can be used to test connectivity. -
Question 22 of 31
22. Question
1 pointsWhy would a Layer 2 switch need an IP address?Correct
Incorrect
A switch, as a Layer 2 device, does not need an IP address to transmit frames to attached devices. However, when a switch is accessed remotely through the network, it must have a Layer 3 address. The IP address must be applied to a virtual interface rather than to a physical interface. Routers, not switches, function as default gateways.Hint
A switch, as a Layer 2 device, does not need an IP address to transmit frames to attached devices. However, when a switch is accessed remotely through the network, it must have a Layer 3 address. The IP address must be applied to a virtual interface rather than to a physical interface. Routers, not switches, function as default gateways. -
Question 23 of 31
23. Question
1 pointsWhich interface allows remote management of a Layer 2 switch?Correct
Incorrect
In a Layer 2 switch, there is a switch virtual interface (SVI) that provides a means for remotely managing the device.Hint
In a Layer 2 switch, there is a switch virtual interface (SVI) that provides a means for remotely managing the device. -
Question 24 of 31
24. Question
1 pointsWhat command can be used on a Windows PC to see the IP configuration of that computer?Correct
Incorrect
On a Windows PC, the ipconfig command can be used to verify the current IP configuration. The ping command can be used to verify connectivity to other network devices. The show interfaces and show ip interface brief commands are both Cisco IOS commands that are used to see the status of router and switch interfaces.Hint
On a Windows PC, the ipconfig command can be used to verify the current IP configuration. The ping command can be used to verify connectivity to other network devices. The show interfaces and show ip interface brief commands are both Cisco IOS commands that are used to see the status of router and switch interfaces. -
Question 25 of 31
25. Question
1 pointsWhat is a characteristic of a switch virtual interface (SVI)?Correct
Incorrect
Cisco IOS switches have physical ports for devices to connect to, but also have one or more switch virtual interfaces (SVIs). These are virtual interfaces, because there is no physical hardware on the device associated with them, rather they are created in software. The virtual interface provides a means to remotely manage a switch over a network that is using IP. Each switch comes with one SVI appearing in the default configuration "out-of-the-box." The default SVI is interface VLAN1. The no shutdown command needs to be issued to activate this interface.Hint
Cisco IOS switches have physical ports for devices to connect to, but also have one or more switch virtual interfaces (SVIs). These are virtual interfaces, because there is no physical hardware on the device associated with them, rather they are created in software. The virtual interface provides a means to remotely manage a switch over a network that is using IP. Each switch comes with one SVI appearing in the default configuration "out-of-the-box." The default SVI is interface VLAN1. The no shutdown command needs to be issued to activate this interface. -
Question 26 of 31
26. Question
3 pointsRefer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command? (Choose three.)Correct
Incorrect
Vlan1 is the default SVI. Because an SVI has been configured, the switch can be configured and managed remotely. FastEthernet0/0 is showing up and up, so a device is connected.Hint
Vlan1 is the default SVI. Because an SVI has been configured, the switch can be configured and managed remotely. FastEthernet0/0 is showing up and up, so a device is connected. -
Question 27 of 31
27. Question
1 pointsA network administrator for a small campus network has issued the show ip interface brief command on a switch. What is the administrator verifying with this command?Correct
Incorrect
The show ip interface brief command is used to verify the status and IP address configuration of the physical and switch virtual interfaces (SVI).Hint
The show ip interface brief command is used to verify the status and IP address configuration of the physical and switch virtual interfaces (SVI). -
Question 28 of 31
28. Question
1 pointsWhat is the default SVI on a Cisco switch?Correct
Incorrect
Layer 2 switches use switch virtual interfaces (SVIs) to provide a means for remote access over IP. The default SVI on a Cisco switch is VLAN1.Hint
Layer 2 switches use switch virtual interfaces (SVIs) to provide a means for remote access over IP. The default SVI on a Cisco switch is VLAN1. -
Question 29 of 31
29. Question
1 pointsTo what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?Correct
Incorrect
The purpose of a subnet mask is to separate the network portion of the address from the host portion of the IP address. The network portion of the IP address is identified by all binary 1s in the subnet mask. Using a subnet mask of 255.255.0.0 identifies the first two octets of the IP address as the network portion.Hint
The purpose of a subnet mask is to separate the network portion of the address from the host portion of the IP address. The network portion of the IP address is identified by all binary 1s in the subnet mask. Using a subnet mask of 255.255.0.0 identifies the first two octets of the IP address as the network portion. -
Question 30 of 31
30. Question
1 pointsWhich functionality is provided by DHCP?Correct
Incorrect
DHCP provides dynamic and automatic IP address assignment to hosts.Hint
DHCP provides dynamic and automatic IP address assignment to hosts. -
Question 31 of 31
31. Question
1 pointsWhich IP address is a valid default gateway for a host on the 10.1.100.0/24 network?Correct
Incorrect
A valid default gateway for the 10.1.100.0/24 network is an IP address within the network range of valid IP addresses, the range which is 10.1.100.1 through 10.1.100.254.Hint
A valid default gateway for the 10.1.100.0/24 network is an IP address within the network range of valid IP addresses, the range which is 10.1.100.1 through 10.1.100.254.