Last Updated on December 29, 2018 by Admin
ITN Chapter 2 Quiz Online Cisco 2019 100%
ITN -- Chapter 2 Quiz
Quiz-summary
0 of 15 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
Information
ITN -- Chapter 2 Quiz
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 15 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Average score |
|
Your score |
|
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- Answered
- Review
-
Question 1 of 15
1. Question
3 pointsWhen a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)Correct
Incorrect
A hostname can be configured with upper or lower case characters and should end with a letter or digit, not a special character. A hostname should start with a letter and no space is allowed for a hostname.
Hint
A hostname can be configured with upper or lower case characters and should end with a letter or digit, not a special character. A hostname should start with a letter and no space is allowed for a hostname. -
Question 2 of 15
2. Question
1 pointsWhy would a technician enter the command copy startup-config running-config?Correct
Incorrect
Usually, changes are made to a running configuration in RAM and copied to NVRAM. However, in this case, the technician wants to copy a previously saved configuration from NVRAM into RAM in order to make changes to it.?
Hint
Usually, changes are made to a running configuration in RAM and copied to NVRAM. However, in this case, the technician wants to copy a previously saved configuration from NVRAM into RAM in order to make changes to it.? -
Question 3 of 15
3. Question
2 pointsWhich two statements are true regarding the user EXEC mode? (Choose two.)Correct
Incorrect
User EXEC mode limits access to some show and debug commands. It is the first level of user interface encountered when configuring a router and is intended for investigation of certain functions of the device. The User EXEC prompt is identified with the ">" symbol.
Hint
User EXEC mode limits access to some show and debug commands. It is the first level of user interface encountered when configuring a router and is intended for investigation of certain functions of the device. The User EXEC prompt is identified with the ">" symbol. -
Question 4 of 15
4. Question
1 pointsWhat command will prevent all unencrypted passwords from displaying in plain text in a configuration file?Correct
Incorrect
To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file.
Hint
To prevent all configured passwords from appearing in plain text in configuration files, an administrator can execute the service password-encryption command. This command encrypts all configured passwords in the configuration file. -
Question 5 of 15
5. Question
1 pointsTo save time, IOS commands may be partially entered and then completed by typing which key or key combination?Correct
Incorrect
-
Question 6 of 15
6. Question
1 pointsHow is SSH different from Telnet?Correct
Incorrect
SSH is the preferred protocol for connecting to a device operating system over the network because it is much more secure than Telnet. Both SSH and Telnet are used to connect to devices over the network, and so are both used in-band. PuTTY and Terra Term can be used to make both SSH and Telnet connections.
Hint
SSH is the preferred protocol for connecting to a device operating system over the network because it is much more secure than Telnet. Both SSH and Telnet are used to connect to devices over the network, and so are both used in-band. PuTTY and Terra Term can be used to make both SSH and Telnet connections. -
Question 7 of 15
7. Question
3 pointsPasswords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)Correct
Incorrect
Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes.
Hint
Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes. -
Question 8 of 15
8. Question
1 pointsWhich device acts as a gateway to allow hosts to send traffic to remote IP networks?Correct
Incorrect
For hosts to reach remote networks, they must send traffic to a local router that can route the traffic to the correct destination network. This local router is known as the default gateway and hosts must be configured with this address in order to communicate with devices on remote networks.
Hint
For hosts to reach remote networks, they must send traffic to a local router that can route the traffic to the correct destination network. This local router is known as the default gateway and hosts must be configured with this address in order to communicate with devices on remote networks. -
Question 9 of 15
9. Question
1 pointsAn administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?Correct
Incorrect
Changes to router and switch configurations take effect as soon as the command is entered. For this reason, it is very important that changes to live production devices are always carefully planned before being implemented. If commands are entered that render the device unstable or inaccessible, the device may have to be reloaded, resulting in network downtime.
Hint
Changes to router and switch configurations take effect as soon as the command is entered. For this reason, it is very important that changes to live production devices are always carefully planned before being implemented. If commands are entered that render the device unstable or inaccessible, the device may have to be reloaded, resulting in network downtime. -
Question 10 of 15
10. Question
1 pointsA technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?Correct
Incorrect
For a switch to have an IP address, a switch virtual interface must be configured. This allows the switch to be managed remotely over the network.
Hint
For a switch to have an IP address, a switch virtual interface must be configured. This allows the switch to be managed remotely over the network. -
Question 11 of 15
11. Question
1 pointsAn IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect to the LAN, the employee receives a duplicate IP address error message. What can the company do to prevent this situation from arising again?Correct
Incorrect
Assigning IP addresses automatically using DHCP will greatly eliminate the chance of a duplicate IP address error.
Hint
Assigning IP addresses automatically using DHCP will greatly eliminate the chance of a duplicate IP address error. -
Question 12 of 15
12. Question
2 pointsWhich two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)Correct
Incorrect
Context-sensitive help provides the user with a list of commands and the arguments associated with those commands within the current mode of a networking device. A syntax checker provides error checks on submitted commands and the TAB key can be used for command completion if a partial command is entered.
Hint
Context-sensitive help provides the user with a list of commands and the arguments associated with those commands within the current mode of a networking device. A syntax checker provides error checks on submitted commands and the TAB key can be used for command completion if a partial command is entered. -
Question 13 of 15
13. Question
1 pointsFill in the blank. In order to test end-to-end connectivity, you would use the ...................... command.Correct
Incorrect
Connectivity between two end devices can be tested using the ping, tracert, or traceroute commands.
Hint
Connectivity between two end devices can be tested using the ping, tracert, or traceroute commands. -
Question 14 of 15
14. Question
1 pointsTrue or False? Mobile devices do not require IP addresses to communicate on the Internet.Correct
Incorrect
All devices that communicate over data networks need unique IP addresses.
-
Question 15 of 15
15. Question
1 pointsFill in the blank. The component of the operating software that provides the user interface is called the ................ .Correct
Incorrect
Operating systems function with a shell, a kernel, and the hardware. The shell interfaces with the users, allowing them to request specific tasks from the device. The kernel provisions resources from the hardware to meet software requirements. The hardware functions by using drivers and their underlying electronics. The hardware represents the physical components of the device.
Hint
Operating systems function with a shell, a kernel, and the hardware. The shell interfaces with the users, allowing them to request specific tasks from the device. The kernel provisions resources from the hardware to meet software requirements. The hardware functions by using drivers and their underlying electronics. The hardware represents the physical components of the device.