Chapter 2 Quiz CIS161
Unlock all answers in this set
Unlock answersquestion
The component of the operating software that provides the user interface is called the _____
answer
Shell
question
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
answer
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
question
Why would a technician enter the command copy startup-config running-config?
answer
to copy an existing configuration into RAM
question
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)
answer
The hostname should be fewer than 64 characters in length, the hostname should contain no spaces, the hostname should begin with a letter.
question
To save time, IOS commands may be partially entered and then completed by typing which key or key combination?
answer
Tab
question
Which device acts as a gateway to allow hosts to send traffic to remote IP networks?
answer
Local router
question
Which two statements are true regarding the user EXEC mode? (Choose two.)
answer
The device prompt for this mode ends with the ">" symbol, Only some aspects of the router configuration can be viewed.
question
An IT technician has manually configured an IP address on a laptop for a new employee. Each time the employee tries to connect to the LAN, the employee receives a duplicate IP address error message. What can the company do to prevent this situation from arising again?
answer
Use DHCP to automatically assign addresses.
question
True or False? Mobile devices do not require IP addresses to communicate on the Internet.
answer
False
question
In order to test end-to-end connectivity, you would use the _____ command.
answer
Ping
question
Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)
answer
VTY, Console interface, Privileged EXEC mode
question
How is SSH different from Telnet?
answer
SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered insecure and sends messages in plaintext.
question
What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?
answer
(config)# service password-encryption
question
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
answer
Displaying a list of all available commands within the current mode, determining which option, keyword, or argument is available for the entered command.
question
A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?
answer
Switch Virtual Interface (SVI)