SlideShare uma empresa Scribd logo
1 de 4
Baixar para ler offline
Chapter 5

True/False
Indicate whether the statement is true or false.

____    1. Routers operate at the Application layer of the OSI reference model.

____    2. In addition to the AUX and the console ports, you can use five virtual terminals (VTY) to configure a Cisco
           router.

____    3. The system configuration dialog presents a series of prompts that guide you through the initial configuration
           for the router.

____    4. The enable password is stored in an encrypted form for increased security.

____    5. The content of ROM is maintained even when the router is rebooted.


Multiple Choice
Identify the choice that best completes the statement or answers the question.

____    6. Network administrators typically access the router directly through the console port (also known as the ____)
           located on the back of the router.
           a. DB-9                                         c. console
           b. VTY                                          d. AUX
____    7. The console port connects directly to a PC through a(n) ____ rollover cable
           a. RJ-45 to RJ-10                               c. RJ-9 to RJ-45
           b. RJ-45 to RJ-45                               d. RJ-9 to RJ-10

____    8. The ____ port allows a remote administrator to dial into the router through an external modem.
           a. auxiliary                                   c. virtual
           b. console                                     d. terminal
____    9. You can access the system configuration dialog by typing the ____ command at the privileged EXEC prompt.
           a. init                                        c. dialog
           b. config                                      d. setup
____ 10. By default, a Cisco router’s host name is ____.
         a. host                                         c. cisco01
         b. router                                       d. tiger
____ 11. When the prompt displayed is the greater than symbol, the router is in ____ EXEC mode.
         a. privileged                                  c. superuser
         b. admin                                       d. user

____ 12. User mode does not allow you to configure the router. To do this, you must go into the ____ EXEC mode.
         a. privileged                                  c. user
         b. config                                      d. router
____ 13. To enter privileged EXEC, you can type the ____ command at the user mode prompt.
         a. sudo                                       c. enable
b. setup                                        d. privileged
____ 14. With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you
         access the router.
         a. global                                    c. router
         b. interface                                 d. line
____ 15. If you want to remove the enable secret password, you can type ____ at the global configuration mode
         prompt.
         a. enable secret off                           c. no enable secret
         b. enable off                                  d. no secret
____ 16. The editing command ____ moves the cursor to the end of the current line.
         a. Ctrl+E                                   c. Esc+B
         b. Ctrl+F                                   d. Esc+F
____ 17. The editing command ____ moves the cursor one character to the right.
         a. Ctrl+E                                   c. Esc+B
         b. Ctrl+F                                   d. Esc+F

____ 18. The ____ command is typically used as a legal means of warning anyone who accesses the banner that they
         will be held accountable.
         a. banner legal                               c. banner motd
         b. legal motd                                 d. motd on

____ 19. You can configure a description for each of the interfaces physically attached to your router by using the ____
         command.
         a. banner                                        c. motd
         b. description                                   d. interface

____ 20. Use the ____ command in enable mode to configure the time.
         a. clock set                                c. clock on
         b. time set                                 d. time on
____ 21. ____ is a type of erasable, programmable, read-only memory (EPROM).
         a. ROM                                         c. DRAM
         b. NVRAM                                       d. Flash memory
____ 22. ____ contains the working copy of the current Cisco IOS and is the component that initializes the IOS for
         normal router operations.
         a. ROM                                         c. DRAM
         b. Flash memory                                d. NVRAM
____ 23. ____ is a special type of RAM that is not cleared when the router is rebooted.
         a. DRAM                                         c. ROM
         b. Flash memory                                 d. NVRAM
____ 24. The startup configuration file for the router is stored in ____ by default.
         a. NVRAM                                           c. flash memory
         b. ROM                                             d. DRAM
____ 25. Random access memory (RAM), also known as ____, is a volatile hardware component because its
         information is not maintained in the event of a router reboot.
         a. ROM                                           c. DRAM
b. NVRAM                                       d. EPROM
____ 26. The command ____ displays the current startup configuration file on the router, which is stored in NVRAM.
         a. show running-config                        c. show buffers
         b. show memory                                d. show startup-config


Completion
Complete each statement.

      27. Network administrators commonly configure and interact with a Cisco router via the Cisco
          ____________________.

      28. Privileged EXEC mode is called ____________________ mode because you must enter the enable
          command to access it.

      29. You can turn off the enhanced editing features by typing ____________________ at either the user EXEC or
          the privileged EXEC prompts.

      30. When entering the time zone, you must include the name of the time zone and the offset from the
          ____________________.

      31. A router’s ____________________ loads the bootstrap program that initializes the router’s basic hardware
          components.


Matching

           Match each item with a statement below:
           a. Cisco IOS                                   f.   login command
           b. EXEC                                        g.   Ctrl+A
           c. CiscoWorks                                  h.   Banner
           d. Global configuration mode                   i.   Interface description
           e. Interface configuration mode
____ 32. specifies that users must log in when they access the console line
____ 33. helps you remember which network the interface services
____ 34. network management software used to manage Cisco routers
____ 35. allows you to configure the Ethernet and serial interfaces on your router
____ 36. editing command that moves the cursor to the beginning of the current line
____ 37. the software that interprets the Cisco IOS commands
____ 38. basic configuration mode in Cisco IOS
____ 39. provides a command-line interface (CLI), which allows network operators to check the status of the router
         and network administrators to manage and configure the router
____ 40. message that you can configure to display each time someone attempts to log in to the router
Short Answer

     41. What are some of the benefits of routing?

     42. What are some of the tasks that can be performed at the privileged EXEC mode?

     43. How can you set both the enable password and the enable secret password?

     44. Describe the command history feature.

     45. How can you configure a router host name?

     46. How can you configure a router’s banner?

     47. Describe the router’s ROM.

     48. Describe a router’s flash memory.

     49. Describe a router’s NVRAM component.

     50. What are some of the types of interfaces in a Cisco router?

Mais conteúdo relacionado

Mais procurados

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
Dsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
Dsunte Wilson
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
gopi1985
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
Sachii Dosti
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 Stp
F.l. Yu
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
Ashraf Uddin
 

Mais procurados (20)

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Ch22
Ch22Ch22
Ch22
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Networking
NetworkingNetworking
Networking
 
M Qi Series Linux
M Qi Series LinuxM Qi Series Linux
M Qi Series Linux
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Inter quiz
Inter quizInter quiz
Inter quiz
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 Stp
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz student
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
 
Presentation on copy
Presentation  on   copyPresentation  on   copy
Presentation on copy
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 

Destaque

CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
Dsunte Wilson
 
Energie nucleaire
Energie nucleaireEnergie nucleaire
Energie nucleaire
CinemaTICE
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
Dsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
Dsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
Dsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
Dsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
Dsunte Wilson
 
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 cLe fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
jlealleon
 

Destaque (11)

CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
Energie nucleaire
Energie nucleaireEnergie nucleaire
Energie nucleaire
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 cLe fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
 

Semelhante a CCNA Router and IOS Basics Questions

CUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : NotesCUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : Notes
Subhajit Sahu
 
Exploiting Llinux Environment
Exploiting Llinux EnvironmentExploiting Llinux Environment
Exploiting Llinux Environment
Enrico Scapin
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answers
ProfessorLance
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answers
ProfessorLance
 
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36   privilege escalation exploitExploit access root to kernel 2.6.32 2.6.36   privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
Carlos Eduardo
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1
Tai Lam
 
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfChapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
akknit
 

Semelhante a CCNA Router and IOS Basics Questions (20)

Embedded based microprocessor system one marks 50 questions and answers by S...
Embedded based microprocessor system one marks 50 questions and answers  by S...Embedded based microprocessor system one marks 50 questions and answers  by S...
Embedded based microprocessor system one marks 50 questions and answers by S...
 
0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit
 
Bc0042 os-mqp
Bc0042 os-mqpBc0042 os-mqp
Bc0042 os-mqp
 
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
 
CUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : NotesCUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : Notes
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
 
Exploiting Llinux Environment
Exploiting Llinux EnvironmentExploiting Llinux Environment
Exploiting Llinux Environment
 
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answers
 
000-232 Exams
000-232 Exams000-232 Exams
000-232 Exams
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answers
 
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36   privilege escalation exploitExploit access root to kernel 2.6.32 2.6.36   privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
 
Linux, PHP, SMS - USSD Examination
Linux, PHP,  SMS - USSD ExaminationLinux, PHP,  SMS - USSD Examination
Linux, PHP, SMS - USSD Examination
 
Roll your own toy unix clone os
Roll your own toy unix clone osRoll your own toy unix clone os
Roll your own toy unix clone os
 
C programming session9 -
C programming  session9 -C programming  session9 -
C programming session9 -
 
Intro2 Cuda Moayad
Intro2 Cuda MoayadIntro2 Cuda Moayad
Intro2 Cuda Moayad
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1
 
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
 
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfChapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
 

Mais de Dsunte Wilson

CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
Dsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
Dsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
Dsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
Dsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
Dsunte Wilson
 

Mais de Dsunte Wilson (12)

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 

CCNA Router and IOS Basics Questions

  • 1. Chapter 5 True/False Indicate whether the statement is true or false. ____ 1. Routers operate at the Application layer of the OSI reference model. ____ 2. In addition to the AUX and the console ports, you can use five virtual terminals (VTY) to configure a Cisco router. ____ 3. The system configuration dialog presents a series of prompts that guide you through the initial configuration for the router. ____ 4. The enable password is stored in an encrypted form for increased security. ____ 5. The content of ROM is maintained even when the router is rebooted. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. Network administrators typically access the router directly through the console port (also known as the ____) located on the back of the router. a. DB-9 c. console b. VTY d. AUX ____ 7. The console port connects directly to a PC through a(n) ____ rollover cable a. RJ-45 to RJ-10 c. RJ-9 to RJ-45 b. RJ-45 to RJ-45 d. RJ-9 to RJ-10 ____ 8. The ____ port allows a remote administrator to dial into the router through an external modem. a. auxiliary c. virtual b. console d. terminal ____ 9. You can access the system configuration dialog by typing the ____ command at the privileged EXEC prompt. a. init c. dialog b. config d. setup ____ 10. By default, a Cisco router’s host name is ____. a. host c. cisco01 b. router d. tiger ____ 11. When the prompt displayed is the greater than symbol, the router is in ____ EXEC mode. a. privileged c. superuser b. admin d. user ____ 12. User mode does not allow you to configure the router. To do this, you must go into the ____ EXEC mode. a. privileged c. user b. config d. router ____ 13. To enter privileged EXEC, you can type the ____ command at the user mode prompt. a. sudo c. enable
  • 2. b. setup d. privileged ____ 14. With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you access the router. a. global c. router b. interface d. line ____ 15. If you want to remove the enable secret password, you can type ____ at the global configuration mode prompt. a. enable secret off c. no enable secret b. enable off d. no secret ____ 16. The editing command ____ moves the cursor to the end of the current line. a. Ctrl+E c. Esc+B b. Ctrl+F d. Esc+F ____ 17. The editing command ____ moves the cursor one character to the right. a. Ctrl+E c. Esc+B b. Ctrl+F d. Esc+F ____ 18. The ____ command is typically used as a legal means of warning anyone who accesses the banner that they will be held accountable. a. banner legal c. banner motd b. legal motd d. motd on ____ 19. You can configure a description for each of the interfaces physically attached to your router by using the ____ command. a. banner c. motd b. description d. interface ____ 20. Use the ____ command in enable mode to configure the time. a. clock set c. clock on b. time set d. time on ____ 21. ____ is a type of erasable, programmable, read-only memory (EPROM). a. ROM c. DRAM b. NVRAM d. Flash memory ____ 22. ____ contains the working copy of the current Cisco IOS and is the component that initializes the IOS for normal router operations. a. ROM c. DRAM b. Flash memory d. NVRAM ____ 23. ____ is a special type of RAM that is not cleared when the router is rebooted. a. DRAM c. ROM b. Flash memory d. NVRAM ____ 24. The startup configuration file for the router is stored in ____ by default. a. NVRAM c. flash memory b. ROM d. DRAM ____ 25. Random access memory (RAM), also known as ____, is a volatile hardware component because its information is not maintained in the event of a router reboot. a. ROM c. DRAM
  • 3. b. NVRAM d. EPROM ____ 26. The command ____ displays the current startup configuration file on the router, which is stored in NVRAM. a. show running-config c. show buffers b. show memory d. show startup-config Completion Complete each statement. 27. Network administrators commonly configure and interact with a Cisco router via the Cisco ____________________. 28. Privileged EXEC mode is called ____________________ mode because you must enter the enable command to access it. 29. You can turn off the enhanced editing features by typing ____________________ at either the user EXEC or the privileged EXEC prompts. 30. When entering the time zone, you must include the name of the time zone and the offset from the ____________________. 31. A router’s ____________________ loads the bootstrap program that initializes the router’s basic hardware components. Matching Match each item with a statement below: a. Cisco IOS f. login command b. EXEC g. Ctrl+A c. CiscoWorks h. Banner d. Global configuration mode i. Interface description e. Interface configuration mode ____ 32. specifies that users must log in when they access the console line ____ 33. helps you remember which network the interface services ____ 34. network management software used to manage Cisco routers ____ 35. allows you to configure the Ethernet and serial interfaces on your router ____ 36. editing command that moves the cursor to the beginning of the current line ____ 37. the software that interprets the Cisco IOS commands ____ 38. basic configuration mode in Cisco IOS ____ 39. provides a command-line interface (CLI), which allows network operators to check the status of the router and network administrators to manage and configure the router ____ 40. message that you can configure to display each time someone attempts to log in to the router
  • 4. Short Answer 41. What are some of the benefits of routing? 42. What are some of the tasks that can be performed at the privileged EXEC mode? 43. How can you set both the enable password and the enable secret password? 44. Describe the command history feature. 45. How can you configure a router host name? 46. How can you configure a router’s banner? 47. Describe the router’s ROM. 48. Describe a router’s flash memory. 49. Describe a router’s NVRAM component. 50. What are some of the types of interfaces in a Cisco router?