1 What are three characteristics of an SVI? (Choose three.
)
1What are three characteristics of an SVI? (Choose three.)
It is a special interface that allows connectivity by different types of media.
It is associated with VLAN1 by default.
It is not associated with any physical interface on a switch.
It provides a means to remotely manage a switch.
It is designed as a security protocol to protect switch ports.
It is required to allow connectivity by any device at any location.
2A network administrator enters the service password-encryption command into the
configuration mode of a router. What does this command accomplish?
This command enables a strong encryption algorithm for the enable secret password command.
This command automatically encrypts passwords in configuration files that are currently stored in NVRAM.
This command encrypts passwords as they are transmitted across serial WAN links.
This command provides an exclusive encrypted password for external service personnel who are required to
do router maintenance.
This command prevents someone from viewing the running configuration passwords.
Navigation Bar
3 Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can
be protected with passwords. (Choose three.)
3Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the
modes and interfaces that can be protected with passwords. (Choose three.)
VTY interface
router configuration mode
console interface
privileged EXEC mode
boot IOS mode
Ethernet interface
8 While trying to solve a network issue, a technician made multiple changes to the current router configuration file.
The changes did not solve the problem and were not saved. What action can the technician take to discard the
changes and work with the file in NVRAM?
8While trying to solve a network issue, a technician made multiple changes to the
current router configuration file. The changes did not solve the problem and were not
saved. What action can the technician take to discard the changes and work with the
file in NVRAM?
Issue the copy startup-config running-config command.
Close and reopen the terminal emulation software.
Delete the vlan.dat file and reboot the device.
Issue the reload command without saving the running configuration.
9 Which command or key combination allows a user to return to the previous level in the command hierarchy?
9Which command or key combination allows a user to return to the previous
level in the command hierarchy?
Ctrl-C
exit
end
Ctrl-Z
Navigation Bar
10 What function does pressing the Tab key have when entering a command in IOS?
10What function does pressing the Tab key have when entering a command in IOS?
It completes the remainder of a partially typed word in a command.
It aborts the current command and returns to configuration mode.
It moves the cursor to the beginning of the next line.
It exits configuration mode and returns to user EXEC mode.
11 What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a
configured IP address?
11What command is used to verify the condition of the switch interfaces, including
the status of the interfaces and a configured IP address?
traceroute
ping
ipconfig
show ip interface brief
12 An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing the ping command. What is the
purpose of using these keystrokes?
12An administrator uses the Ctrl-Shift-6 key combination on a switch after issuing
the ping command. What is the purpose of using these keystrokes?
to restart the ping process
to interrupt the ping process
to exit to a different configuration mode
to allow the user to complete the command
13 How is SSH different from Telnet?
13How is SSH different from Telnet?
SSH must be configured over an active network connection, whereas Telnet is used to connect to a device from a
console connection.
SSH provides security to remote sessions by encrypting messages and using user authentication. Telnet is considered
insecure and sends messages in plaintext.
SSH makes connections over the network, whereas Telnet is for out-of-band access.
SSH requires the use of the PuTTY terminal emulation program. Tera Term must be used to connect to devices through
the use of Telnet.
14 An employee at a branch office is creating a quote for a customer. In order to do this, the employee needs to
access confidential pricing information from internal servers at the Head Office. What type of network would the
employee access?
14An employee at a branch office is creating a quote for a customer. In order to do
this, the employee needs to access confidential pricing information from internal
servers at the Head Office. What type of network would the employee access?
a local area network
an extranet
an intranet
the Internet
15 A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up
the wireless network so that patients can see the medical records data of other patients. Which of the four network
characteristics has been violated in this situation?
15A networking technician is working on the wireless network at a medical clinic.
The technician accidentally sets up the wireless network so that patients can see the
medical records data of other patients. Which of the four network characteristics has
been violated in this situation?
scalability
fault tolerance
security
reliability
Quality of Service (QoS)
16Which statement describes the use of powerline networking technology?
A home LAN is installed without the use of physical cabling.
Wireless access points use powerline adapters to distribute data through the home LAN.
A device connects to an existing home LAN using an adapter and an existing electrical outlet.
New "smart" electrical cabling is used to extend an existing home LAN.
17 Which name is assigned to the transport layer PDU?
17Which name is assigned to the transport layer PDU?
packet
segment
bits
data
frame
18 Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?
18Which statement accurately describes a TCP/IP encapsulation process when a PC is
sending data to the network?
Frames are sent from the network access layer to the internet layer.
Segments are sent from the transport layer to the internet layer.
Packets are sent from the network access layer to the transport layer.
Data is sent from the internet layer to the network access layer.