Вы находитесь на странице: 1из 10

7/2/2019 Chapter 2 Quiz: 5th_CEA_Module_1_2019

Chapter 2 Quiz
Due No due date Points 30 Questions 15 Time Limit None
Allowed Attempts Unlimited

Instructions
This quiz covers the content in CCNA R&S Introduction to Networks Chapter 2. It is designed to provide an
additional opportunity to practice the skills and knowledge presented in the chapter and to prepare for the
Chapter Exam. You will be allowed multiple attempts and the grade does not appear in the gradebook.

There are multiple task types that may be available in this quiz. Rather than having static graphics to view,
some items may require you to open a PT activity and perform some investigation and configuration of
devices before answering the question.

NOTE: There are some small differences in how the questions score and operate in the Quiz and how they
score and operate in the Chapter Exam. Quizzes allow for partial credit scoring on all item types to foster
learning. Points on quizzes can also be deducted for answering incorrectly. This does not occur with
the Chapter Exam.

Form 31011

Take the Quiz Again

Attempt History
Attempt Time Score
LATEST Attempt 1 8 minutes 28 out of 30

Submitted Jul 2 at 11:40am

Question 1 2 / 2 pts

Why would a technician enter the command copy startup-config running-


config?

to remove all configurations from the switch

to save an active configuration to NVRAM

Correct!
to copy an existing configuration into RAM

to make a changed configuration the new startup configuration

https://44496793.netacad.com/courses/855232/quizzes/7726527 1/10
7/2/2019 Chapter 2 Quiz: 5th_CEA_Module_1_2019

Refer to curriculum topic: 2.2.3


Usually, changes are made to a running configuration in RAM and
copied to NVRAM. However, in this case, the technician wants to copy
a previously saved configuration from NVRAM into RAM in order to
make changes to it.

Question 2 2 / 2 pts

When a hostname is configured through the Cisco CLI, which three naming
conventions are part of the guidelines? (Choose three.)

Correct!
the hostname should be fewer than 64 characters in length

the hostname should be written in all lower case characters

Correct!
the hostname should contain no spaces

the hostname should end with a special character

Correct!
the hostname should begin with a letter

Refer to curriculum topic: 2.2.1


A hostname can be configured with upper or lower case characters
and should end with a letter or digit, not a special character. A
hostname should start with a letter and no space is allowed for a
hostname.

Question 3 2 / 2 pts

Which device acts as a gateway to allow hosts to send traffic to remote IP


networks?

DNS server

https://44496793.netacad.com/courses/855232/quizzes/7726527 2/10
7/2/2019 Chapter 2 Quiz: 5th_CEA_Module_1_2019

DHCP server

Correct!
local router

local switch

Refer to curriculum topic: 2.3.1


For hosts to reach remote networks, they must send traffic to a local
router that can route the traffic to the correct destination network. This
local router is known as the default gateway and hosts must be
configured with this address in order to communicate with devices on
remote networks.

Question 4 2 / 2 pts

What command will prevent all unencrypted passwords from displaying in


plain text in a configuration file?

(config)# enable password secret

(config)# enable secret Secret_Password

(config-line)# password secret

Correct!
(config)# service password-encryption

(config)# enable secret Encrypted_Password

Refer to curriculum topic: 2.2.2


To prevent all configured passwords from appearing in plain text in
configuration files, an administrator can execute the service
password-encryption command. This command encrypts all
configured passwords in the configuration file.

Question 5 2 / 2 pts
https://44496793.netacad.com/courses/855232/quizzes/7726527 3/10
7/2/2019 Chapter 2 Quiz: 5th_CEA_Module_1_2019

A technician configures a switch with these commands:

SwitchA(config)# interface vlan 1


SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0
SwitchA(config-if)# no shutdown

What is the technician configuring?

Telnet access

Correct!
SVI

password encryption

physical switchport access

Refer to curriculum topic: 2.3.2


For a switch to have an IP address, a switch virtual interface must be
configured. This allows the switch to be managed remotely over the
network.

Question 6 2 / 2 pts

Which two functions are provided to users by the context-sensitive help


feature of the Cisco IOS CLI? (Choose two.)

providing an error message when a wrong command is submitted

Correct!
displaying a list of all available commands within the current mode

allowing the user to complete the remainder of an abbreviated command with


the TAB key

Correct!
determining which option, keyword, or argument is available for the entered
command

https://44496793.netacad.com/courses/855232/quizzes/7726527 4/10
7/2/2019 Chapter 2 Quiz: 5th_CEA_Module_1_2019

selecting the best command to accomplish a task

Refer to curriculum topic: 2.1.4


Context-sensitive help provides the user with a list of commands and
the arguments associated with those commands within the current
mode of a networking device. A syntax checker provides error checks
on submitted commands and the TAB key can be used for command
completion if a partial command is entered.

Question 7 2 / 2 pts

True or False?
Mobile devices do not require IP addresses to communicate on the Internet.

True

Correct!
False

Refer to curriculum topic: 2.3.1


All devices that communicate over data networks need unique IP
addresses.

Question 8 0 / 2 pts

Fill in the blank.


In order to test end-to-end connectivity, you would use the
Ping Trace tracerout command.

Answer 1:

You Answered Ping Trace traceroute tracert

orrect Answer ping

https://44496793.netacad.com/courses/855232/quizzes/7726527 5/10
7/2/2019 Chapter 2 Quiz: 5th_CEA_Module_1_2019

orrect Answer trace

orrect Answer traceroute

orrect Answer tracert

Refer to curriculum topic: 2.3.3


Connectivity between two end devices can be tested using the ping,
tracert, or traceroute commands.

Question 9 2 / 2 pts

Fill in the blank.


The component of the operating software that provides the user interface is

called the shell .

Answer 1:

Correct! shell

Refer to curriculum topic: 2.1.1


Operating systems function with a shell, a kernel, and the hardware.
The shell interfaces with the users, allowing them to request specific
tasks from the device. The kernel provisions resources from the
hardware to meet software requirements. The hardware functions by
using drivers and their underlying electronics. The hardware
represents the physical components of the device.

Question 10 2 / 2 pts

Passwords can be used to restrict access to all or parts of the Cisco IOS.
Select the modes and interfaces that can be protected with passwords.
(Choose three.)

https://44496793.netacad.com/courses/855232/quizzes/7726527 6/10
7/2/2019 Chapter 2 Quiz: 5th_CEA_Module_1_2019

Correct! VTY interface

Correct! console interface

Ethernet interface

boot IOS mode

Correct! privileged EXEC mode

router configuration mode

Refer to curriculum topic: 2.2.2


Access to the VTY and console interfaces can be restricted using
passwords. Out-of-band management of the router can be restricted
in both user EXEC and privileged EXEC modes.

Question 11 2 / 2 pts

To save time, IOS commands may be partially entered and then completed
by typing which key or key combination?

Correct! Tab

Ctrl-P

Ctrl-N

Up Arrow

Right Arrow

Down Arrow

Refer to curriculum topic: 2.1.4

https://44496793.netacad.com/courses/855232/quizzes/7726527 7/10
7/2/2019 Chapter 2 Quiz: 5th_CEA_Module_1_2019

Question 12 2 / 2 pts

How is SSH different from Telnet?

SSH makes connections over the network, whereas Telnet is for out-of-band
access.

Correct!
SSH provides security to remote sessions by encrypting messages and using
user authentication. Telnet is considered insecure and sends messages in
plaintext.

SSH requires the use of the PuTTY terminal emulation program. Tera Term
must be used to connect to devices through the use of Telnet.

SSH must be configured over an active network connection, whereas Telnet is


used to connect to a device from a console connection.

Refer to curriculum topic: 2.1.2


SSH is the preferred protocol for connecting to a device operating
system over the network because it is much more secure than Telnet.
Both SSH and Telnet are used to connect to devices over the network,
and so are both used in-band. PuTTY and Terra Term can be used to
make both SSH and Telnet connections.

Question 13 2 / 2 pts

Which two statements are true regarding the user EXEC mode? (Choose
two.)

All router commands are available.

Global configuration mode can be accessed by entering the enable command.

https://44496793.netacad.com/courses/855232/quizzes/7726527 8/10
7/2/2019 Chapter 2 Quiz: 5th_CEA_Module_1_2019

Correct! The device prompt for this mode ends with the ">" symbol.

Interfaces and routing protocols can be configured.

Correct! Only some aspects of the router configuration can be viewed.

Refer to curriculum topic: 2.1.3


User EXEC mode limits access to some show and debug
commands. It is the first level of user interface encountered when
configuring a router and is intended for investigation of certain
functions of the device. The User EXEC prompt is identified with the
">" symbol.

Question 14 2 / 2 pts

An administrator has just changed the IP address of an interface on an IOS


device. What else must be done in order to apply those changes to the
device?

Copy the running configuration to the startup configuration file.

Copy the information in the startup configuration file to the running


configuration.

Reload the device and type yes when prompted to save the configuration.

Correct!
Nothing must be done. Changes to the configuration on an IOS device take
effect as soon as the command is typed correctly and the Enter key has been
pressed.

https://44496793.netacad.com/courses/855232/quizzes/7726527 9/10
7/2/2019 Chapter 2 Quiz: 5th_CEA_Module_1_2019

Refer to curriculum topic: 2.2.3


Changes to router and switch configurations take effect as soon as
the command is entered. For this reason, it is very important that
changes to live production devices are always carefully planned
before being implemented. If commands are entered that render the
device unstable or inaccessible, the device may have to be reloaded,
resulting in network downtime.

Question 15 2 / 2 pts

An IT technician has manually configured an IP address on a laptop for a


new employee. Each time the employee tries to connect to the LAN, the
employee receives a duplicate IP address error message. What can the
company do to prevent this situation from arising again?

Configure the IP address on an SVI on the laptop.

Use a virtual private network instead of the company LAN.

Correct! Use DHCP to automatically assign addresses.

Use laptops that do not require IP addresses.

Refer to curriculum topic: 2.3.2


Assigning IP addresses automatically using DHCP will greatly
eliminate the chance of a duplicate IP address error.

https://44496793.netacad.com/courses/855232/quizzes/7726527 10/10

Вам также может понравиться