1. What level of logging to the console is the default for a Cisco device?
a. Informational b. Errors c. Warnings d. Debugging
2. What command limits the messages sent to a syslog server to levels 4 through 0?
a. logging trap 0-4 b. logging trap 0,1,2,3,4 c. logging trap 4 d. logging trap through 4
3. Which of the following is accurate about the NTP client function on a Cisco router?
a. The client synchronizes its time-of-day clock based on the NTP server. b. It counts CPU cycles of the local router CPU to more accurately keep time. c. The client synchronizes its serial line clock rate based on the NTP server. d. The client must be connected to the same subnet as an NTP server.
4. Router R2 uses NTP in client/server mode. Which of the following correctly describes the use of the NTP configuration commands on Router R2? (Choose two answers.)
a. The ntp server command enables R2’s NTP server function. b. The ntp server command makes R2 an NTP client and references a server. c. The ntp master command enables R2’s NTP server function. d. The ntp master command enables R2’s client function and references the server.
5. Imagine that a switch connects through an Ethernet cable to a router, and the router’s host name is Hannah. Which of the following commands could tell you information about the IOS version on Hannah without establishing a Telnet connection to Hannah? (Choose two answers.)
a. show neighbors Hannah b. show cdp c. show cdp neighbors d. show cdp neighbors Hannah e. show cdp entry Hannah f. show cdp neighbors detail
6. A switch is cabled to a router whose host name is Hannah. Which of the following LLDP commands could identify Hannah’s model of hardware? (Choose two answers.)
a. show neighbors b. show neighbors Hannah c. show lldp d. show lldp interface e. show lldp neighbors f. show lldp entry Hannah
1. Imagine that you have configured the enable secret
command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode?
a. enable password b. enable secret c. Neither d. The password command, if it’s configured
2. Some IOS commands store passwords as clear text, but you can then encrypt the passwords with the service password-encryption global command. By comparison, other commands store a computed hash of the password, rather than storing the password. Comparing the two options, which one answer is the most accurate about why one method is better than the other?
a. Using hashes is preferred because encrypted IOS passwords can be easily decrypted. b. Using hashes is preferred because of the large CPU effort required for encryption. c. Using encryption is preferred because it provides stronger password protection. d. Using encryption is preferred because of the large CPU effort required for hashes.
3. A network engineer issues a show running-config
command and sees only one line of output that mentions the enable secret
command, as follows:
enable secret 5 $1$ZGMA$e8cmvkz4UjiJhVp7.maLE1
--Which of the following is true about users of this router?--
a. A user must type $1$ZGMA$e8cmvkz4UjiJhVp7.maLE1 to reach enable mode. b. The router will hash the clear-text password that the user types to compare to the hashed password. c. A no service password-encryption configuration command would decrypt this password. d. The router will decrypt the password in the configuration to compare to the clear-text password typed by the user.
4. The following command was copied and pasted into configuration mode when a user was telnetted into a Cisco switch:
banner login this is the login banner
--Which of the following is true about what occurs the next time a user logs in from the console?--
a. No banner text is displayed. b. The banner text “his is ” is displayed. c. The banner text “this is the login banner” is displayed. d. The banner text “Login banner configured, no text defined” is displayed.
5. A single-line ACL has been added to a router configuration using the command ip access-list 1 permit 172.16.4.0 0.0.1.255
. The configuration also includes the ip access-class 1 in
command in VTY configuration mode. Which answer accurately describes how the router uses ACL 1?
a. Hosts in subnet 172.16.4.0/23 alone can telnet into the router. b. CLI users cannot telnet from the router to hosts in subnet 172.16.4.0/23 alone. c. Hosts in subnet 172.16.4.0/23 alone can log in but cannot reach enable mode of the router. d. The router will only forward packets with source addresses in subnet 172.16.4.0/23.
1. An engineer needs to put a new IOS image into a router’s flash memory as part of an IOS upgrade. Which of the following could the engineer do to move files into the router?
a. Use the copy ftp flash command to copy files into flash using FTP. b. Use the copy flash tftp command to copy files using TFTP into flash. c. Use the copy scp flash command to copy files into flash using SCP. d. Use the ios restore command to copy files into flash from the file archive.
2. What is the first step a typical Cisco router takes during the boot process when attempting to locate an operating system to load?
a. The router looks for an image on a TFTP server. b. The router checks its configuration register boot field. c. The router boots to ROMMON. d. The router looks in flash memory for a Cisco IOS image file.
3. After your Cisco router boots, what is a simple way to verify the Cisco IOS image that was loaded and the location from which it was copied into RAM?
a. show running-config b. show boot c. show cisco ios d. show version
4. Which value in the configuration register controls how the router boots?
a. The third hexadecimal character b. The second hexadecimal character c. The first hexadecimal character d. The last hexadecimal character
5. You have forgotten your privileged mode password and cannot access global configuration mode. During the password recovery process, how can you change the configuration register if you cannot remember enough passwords to get into configuration mode of the router?
a. Using ROMMON mode b. Using the Setup Utility c. Using the GUI for configuring the device d. Using password reset mode
6. What type of router memory is used to store the configuration used by the router when it is up and working?
a. RAM b. ROM c. Flash d. NVRAM
7. An engineer has made dozens of configuration changes to a router’s configuration in the previous hour. The engineer wants to revert back to a configuration that he had previously saved to an external FTP server. Which facilities would allow the engineer to go back to using the exact same running configuration that the router had an hour ago without reloading the router?
a. Use the copy ftp running-config command b. Use the copy ftp startup-config command c. Use the archive restore ftp command d. Use the config replace command
1. Imagine a Cisco router model X. Cisco produced IOS software for this model of router such that its customer could pay for baseline features, additional data features, additional voice features, and additional security features. With this traditional method of software production from Cisco, for a single IOS version, how many IOS images would be available for this one router model X?
a. 1 b. 2 c. 3 d. >3
2. What is the name of the new Cisco IOS image file that provides access to all major IOS features?
a. Universal b. Full c. Complete d. Enhanced
3. What command enables you to show the UDI of your Cisco router?
a. show udi b. show license udi c. show base udi d. show udi base
4. Which of the following answers lists a CLI command on a router that is useful when installing a paid-for technology package license onto a 2901 router that uses Cisco IOS licensing and an IOS universal image?
a. license boot module c2900 technology-package technology-package b. license boot module technology-package technology-package install c. license install url technology-package d. license install url
5. Which of the following answers lists a CLI command on a router that is useful when installing a right-to-use license onto a 2901 router that uses Cisco IOS licensing and an IOS universal image?
a. license boot module c2900 technology-package technology-package b. license boot module technology-package technology-package install c. license install url technology-package d. license install url
End of Part 3
Device Management Protocols:
1. D 2. C 3. A 4. B, C 5. E, F 6. E, F
Device Security Features:
1. B 2. A 3. B 4. B 5. A
Managing IOS Files:
1. A 2. B 3. D 4. D 5. A 6. A 7. D
IOS License Management:
1. D 2. A 3. B 4. D 5. A