SlideShare une entreprise Scribd logo
1  sur  4
Télécharger pour lire hors ligne
Chapter 5

True/False
Indicate whether the statement is true or false.

____    1. Routers operate at the Application layer of the OSI reference model.

____    2. In addition to the AUX and the console ports, you can use five virtual terminals (VTY) to configure a Cisco
           router.

____    3. The system configuration dialog presents a series of prompts that guide you through the initial configuration
           for the router.

____    4. The enable password is stored in an encrypted form for increased security.

____    5. The content of ROM is maintained even when the router is rebooted.


Multiple Choice
Identify the choice that best completes the statement or answers the question.

____    6. Network administrators typically access the router directly through the console port (also known as the ____)
           located on the back of the router.
           a. DB-9                                         c. console
           b. VTY                                          d. AUX
____    7. The console port connects directly to a PC through a(n) ____ rollover cable
           a. RJ-45 to RJ-10                               c. RJ-9 to RJ-45
           b. RJ-45 to RJ-45                               d. RJ-9 to RJ-10

____    8. The ____ port allows a remote administrator to dial into the router through an external modem.
           a. auxiliary                                   c. virtual
           b. console                                     d. terminal
____    9. You can access the system configuration dialog by typing the ____ command at the privileged EXEC prompt.
           a. init                                        c. dialog
           b. config                                      d. setup
____ 10. By default, a Cisco router’s host name is ____.
         a. host                                         c. cisco01
         b. router                                       d. tiger
____ 11. When the prompt displayed is the greater than symbol, the router is in ____ EXEC mode.
         a. privileged                                  c. superuser
         b. admin                                       d. user

____ 12. User mode does not allow you to configure the router. To do this, you must go into the ____ EXEC mode.
         a. privileged                                  c. user
         b. config                                      d. router
____ 13. To enter privileged EXEC, you can type the ____ command at the user mode prompt.
         a. sudo                                       c. enable
b. setup                                        d. privileged
____ 14. With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you
         access the router.
         a. global                                    c. router
         b. interface                                 d. line
____ 15. If you want to remove the enable secret password, you can type ____ at the global configuration mode
         prompt.
         a. enable secret off                           c. no enable secret
         b. enable off                                  d. no secret
____ 16. The editing command ____ moves the cursor to the end of the current line.
         a. Ctrl+E                                   c. Esc+B
         b. Ctrl+F                                   d. Esc+F
____ 17. The editing command ____ moves the cursor one character to the right.
         a. Ctrl+E                                   c. Esc+B
         b. Ctrl+F                                   d. Esc+F

____ 18. The ____ command is typically used as a legal means of warning anyone who accesses the banner that they
         will be held accountable.
         a. banner legal                               c. banner motd
         b. legal motd                                 d. motd on

____ 19. You can configure a description for each of the interfaces physically attached to your router by using the ____
         command.
         a. banner                                        c. motd
         b. description                                   d. interface

____ 20. Use the ____ command in enable mode to configure the time.
         a. clock set                                c. clock on
         b. time set                                 d. time on
____ 21. ____ is a type of erasable, programmable, read-only memory (EPROM).
         a. ROM                                         c. DRAM
         b. NVRAM                                       d. Flash memory
____ 22. ____ contains the working copy of the current Cisco IOS and is the component that initializes the IOS for
         normal router operations.
         a. ROM                                         c. DRAM
         b. Flash memory                                d. NVRAM
____ 23. ____ is a special type of RAM that is not cleared when the router is rebooted.
         a. DRAM                                         c. ROM
         b. Flash memory                                 d. NVRAM
____ 24. The startup configuration file for the router is stored in ____ by default.
         a. NVRAM                                           c. flash memory
         b. ROM                                             d. DRAM
____ 25. Random access memory (RAM), also known as ____, is a volatile hardware component because its
         information is not maintained in the event of a router reboot.
         a. ROM                                           c. DRAM
b. NVRAM                                       d. EPROM
____ 26. The command ____ displays the current startup configuration file on the router, which is stored in NVRAM.
         a. show running-config                        c. show buffers
         b. show memory                                d. show startup-config


Completion
Complete each statement.

      27. Network administrators commonly configure and interact with a Cisco router via the Cisco
          ____________________.

      28. Privileged EXEC mode is called ____________________ mode because you must enter the enable
          command to access it.

      29. You can turn off the enhanced editing features by typing ____________________ at either the user EXEC or
          the privileged EXEC prompts.

      30. When entering the time zone, you must include the name of the time zone and the offset from the
          ____________________.

      31. A router’s ____________________ loads the bootstrap program that initializes the router’s basic hardware
          components.


Matching

           Match each item with a statement below:
           a. Cisco IOS                                   f.   login command
           b. EXEC                                        g.   Ctrl+A
           c. CiscoWorks                                  h.   Banner
           d. Global configuration mode                   i.   Interface description
           e. Interface configuration mode
____ 32. specifies that users must log in when they access the console line
____ 33. helps you remember which network the interface services
____ 34. network management software used to manage Cisco routers
____ 35. allows you to configure the Ethernet and serial interfaces on your router
____ 36. editing command that moves the cursor to the beginning of the current line
____ 37. the software that interprets the Cisco IOS commands
____ 38. basic configuration mode in Cisco IOS
____ 39. provides a command-line interface (CLI), which allows network operators to check the status of the router
         and network administrators to manage and configure the router
____ 40. message that you can configure to display each time someone attempts to log in to the router
Short Answer

     41. What are some of the benefits of routing?

     42. What are some of the tasks that can be performed at the privileged EXEC mode?

     43. How can you set both the enable password and the enable secret password?

     44. Describe the command history feature.

     45. How can you configure a router host name?

     46. How can you configure a router’s banner?

     47. Describe the router’s ROM.

     48. Describe a router’s flash memory.

     49. Describe a router’s NVRAM component.

     50. What are some of the types of interfaces in a Cisco router?

Contenu connexe

Tendances

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Treegopi1985
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Sachii Dosti
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 StpF.l. Yu
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz studentYaser Rahmati
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commandsAniket Thakur
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015vtunotesbysree
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
 

Tendances (20)

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Ch22
Ch22Ch22
Ch22
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Networking
NetworkingNetworking
Networking
 
M Qi Series Linux
M Qi Series LinuxM Qi Series Linux
M Qi Series Linux
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Inter quiz
Inter quizInter quiz
Inter quiz
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 Stp
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz student
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
 
Presentation on copy
Presentation  on   copyPresentation  on   copy
Presentation on copy
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 

En vedette

CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsDsunte Wilson
 
Energie nucleaire
Energie nucleaireEnergie nucleaire
Energie nucleaireCinemaTICE
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Dsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network DevicesDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 cLe fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 cjlealleon
 

En vedette (11)

CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
Energie nucleaire
Energie nucleaireEnergie nucleaire
Energie nucleaire
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 cLe fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
 

Similaire à CCNA Router and IOS Basics Questions

Embedded based microprocessor system one marks 50 questions and answers by S...
Embedded based microprocessor system one marks 50 questions and answers  by S...Embedded based microprocessor system one marks 50 questions and answers  by S...
Embedded based microprocessor system one marks 50 questions and answers by S...eeducations ever
 
0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and ProfitRussell Sanford
 
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdfscribdsituation719
 
CUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : NotesCUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : NotesSubhajit Sahu
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questionsCarmenLamdegil
 
Exploiting Llinux Environment
Exploiting Llinux EnvironmentExploiting Llinux Environment
Exploiting Llinux EnvironmentEnrico Scapin
 
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹GangSeok Lee
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersProfessorLance
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersProfessorLance
 
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36   privilege escalation exploitExploit access root to kernel 2.6.32 2.6.36   privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploitCarlos Eduardo
 
Linux, PHP, SMS - USSD Examination
Linux, PHP,  SMS - USSD ExaminationLinux, PHP,  SMS - USSD Examination
Linux, PHP, SMS - USSD Examinationtawi123
 
Roll your own toy unix clone os
Roll your own toy unix clone osRoll your own toy unix clone os
Roll your own toy unix clone oseramax
 
Intro2 Cuda Moayad
Intro2 Cuda MoayadIntro2 Cuda Moayad
Intro2 Cuda MoayadMoayadhn
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 testSoporte Yottatec
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1Tai Lam
 
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless ModeAkihiro Suda
 
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfChapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfakknit
 

Similaire à CCNA Router and IOS Basics Questions (20)

Embedded based microprocessor system one marks 50 questions and answers by S...
Embedded based microprocessor system one marks 50 questions and answers  by S...Embedded based microprocessor system one marks 50 questions and answers  by S...
Embedded based microprocessor system one marks 50 questions and answers by S...
 
0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit
 
Bc0042 os-mqp
Bc0042 os-mqpBc0042 os-mqp
Bc0042 os-mqp
 
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
 
CUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : NotesCUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : Notes
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
 
Exploiting Llinux Environment
Exploiting Llinux EnvironmentExploiting Llinux Environment
Exploiting Llinux Environment
 
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answers
 
000-232 Exams
000-232 Exams000-232 Exams
000-232 Exams
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answers
 
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36   privilege escalation exploitExploit access root to kernel 2.6.32 2.6.36   privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
 
Linux, PHP, SMS - USSD Examination
Linux, PHP,  SMS - USSD ExaminationLinux, PHP,  SMS - USSD Examination
Linux, PHP, SMS - USSD Examination
 
Roll your own toy unix clone os
Roll your own toy unix clone osRoll your own toy unix clone os
Roll your own toy unix clone os
 
C programming session9 -
C programming  session9 -C programming  session9 -
C programming session9 -
 
Intro2 Cuda Moayad
Intro2 Cuda MoayadIntro2 Cuda Moayad
Intro2 Cuda Moayad
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1
 
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
 
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfChapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
 

Plus de Dsunte Wilson

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 

Plus de Dsunte Wilson (12)

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 

Dernier

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...apidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 

Dernier (20)

Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 

CCNA Router and IOS Basics Questions

  • 1. Chapter 5 True/False Indicate whether the statement is true or false. ____ 1. Routers operate at the Application layer of the OSI reference model. ____ 2. In addition to the AUX and the console ports, you can use five virtual terminals (VTY) to configure a Cisco router. ____ 3. The system configuration dialog presents a series of prompts that guide you through the initial configuration for the router. ____ 4. The enable password is stored in an encrypted form for increased security. ____ 5. The content of ROM is maintained even when the router is rebooted. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. Network administrators typically access the router directly through the console port (also known as the ____) located on the back of the router. a. DB-9 c. console b. VTY d. AUX ____ 7. The console port connects directly to a PC through a(n) ____ rollover cable a. RJ-45 to RJ-10 c. RJ-9 to RJ-45 b. RJ-45 to RJ-45 d. RJ-9 to RJ-10 ____ 8. The ____ port allows a remote administrator to dial into the router through an external modem. a. auxiliary c. virtual b. console d. terminal ____ 9. You can access the system configuration dialog by typing the ____ command at the privileged EXEC prompt. a. init c. dialog b. config d. setup ____ 10. By default, a Cisco router’s host name is ____. a. host c. cisco01 b. router d. tiger ____ 11. When the prompt displayed is the greater than symbol, the router is in ____ EXEC mode. a. privileged c. superuser b. admin d. user ____ 12. User mode does not allow you to configure the router. To do this, you must go into the ____ EXEC mode. a. privileged c. user b. config d. router ____ 13. To enter privileged EXEC, you can type the ____ command at the user mode prompt. a. sudo c. enable
  • 2. b. setup d. privileged ____ 14. With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you access the router. a. global c. router b. interface d. line ____ 15. If you want to remove the enable secret password, you can type ____ at the global configuration mode prompt. a. enable secret off c. no enable secret b. enable off d. no secret ____ 16. The editing command ____ moves the cursor to the end of the current line. a. Ctrl+E c. Esc+B b. Ctrl+F d. Esc+F ____ 17. The editing command ____ moves the cursor one character to the right. a. Ctrl+E c. Esc+B b. Ctrl+F d. Esc+F ____ 18. The ____ command is typically used as a legal means of warning anyone who accesses the banner that they will be held accountable. a. banner legal c. banner motd b. legal motd d. motd on ____ 19. You can configure a description for each of the interfaces physically attached to your router by using the ____ command. a. banner c. motd b. description d. interface ____ 20. Use the ____ command in enable mode to configure the time. a. clock set c. clock on b. time set d. time on ____ 21. ____ is a type of erasable, programmable, read-only memory (EPROM). a. ROM c. DRAM b. NVRAM d. Flash memory ____ 22. ____ contains the working copy of the current Cisco IOS and is the component that initializes the IOS for normal router operations. a. ROM c. DRAM b. Flash memory d. NVRAM ____ 23. ____ is a special type of RAM that is not cleared when the router is rebooted. a. DRAM c. ROM b. Flash memory d. NVRAM ____ 24. The startup configuration file for the router is stored in ____ by default. a. NVRAM c. flash memory b. ROM d. DRAM ____ 25. Random access memory (RAM), also known as ____, is a volatile hardware component because its information is not maintained in the event of a router reboot. a. ROM c. DRAM
  • 3. b. NVRAM d. EPROM ____ 26. The command ____ displays the current startup configuration file on the router, which is stored in NVRAM. a. show running-config c. show buffers b. show memory d. show startup-config Completion Complete each statement. 27. Network administrators commonly configure and interact with a Cisco router via the Cisco ____________________. 28. Privileged EXEC mode is called ____________________ mode because you must enter the enable command to access it. 29. You can turn off the enhanced editing features by typing ____________________ at either the user EXEC or the privileged EXEC prompts. 30. When entering the time zone, you must include the name of the time zone and the offset from the ____________________. 31. A router’s ____________________ loads the bootstrap program that initializes the router’s basic hardware components. Matching Match each item with a statement below: a. Cisco IOS f. login command b. EXEC g. Ctrl+A c. CiscoWorks h. Banner d. Global configuration mode i. Interface description e. Interface configuration mode ____ 32. specifies that users must log in when they access the console line ____ 33. helps you remember which network the interface services ____ 34. network management software used to manage Cisco routers ____ 35. allows you to configure the Ethernet and serial interfaces on your router ____ 36. editing command that moves the cursor to the beginning of the current line ____ 37. the software that interprets the Cisco IOS commands ____ 38. basic configuration mode in Cisco IOS ____ 39. provides a command-line interface (CLI), which allows network operators to check the status of the router and network administrators to manage and configure the router ____ 40. message that you can configure to display each time someone attempts to log in to the router
  • 4. Short Answer 41. What are some of the benefits of routing? 42. What are some of the tasks that can be performed at the privileged EXEC mode? 43. How can you set both the enable password and the enable secret password? 44. Describe the command history feature. 45. How can you configure a router host name? 46. How can you configure a router’s banner? 47. Describe the router’s ROM. 48. Describe a router’s flash memory. 49. Describe a router’s NVRAM component. 50. What are some of the types of interfaces in a Cisco router?