Home > Articles

📄 Contents

  1. Quick Check Answer Key
  2. Answers and Explanations
This chapter is from the book

This chapter is from the book

Answers and Explanations

  1. Answers: A and B. You can issue show or debug commands in either User or Privileged mode. C is incorrect, as you cannot use show commands while in Line Configuration mode. D is incorrect, as you cannot use show commands while in Global Configuration mode.

  2. Answers: A and B. You can store Cisco device configurations on FTP and TFTP servers. TFTP is preferred because of its lower overhead. C is incorrect, as SQL databases do not store Cisco device configurations. D is incorrect, as Oracle databases are not used to store Cisco device configurations.

  3. Answer: D. The show interface command gives you all the physical and logical configuration information about a particular interface. A is incorrect, as ping is a TCP/IP utility that allows you to "ping" a connection to see whether there is connectivity. B is incorrect, as this is the command you would use on a Microsoft Windows PC to find your IP address. C is incorrect, as the traceroute command allows you to track the packet's path to its destination.

  4. Answer: C. You type enable to enter Privileged EXEC mode. A is incorrect, as it is not a valid command. B is incorrect, as it is not a valid command. D is incorrect, as this command would take you out of Privileged EXEC mode.

  5. Answer: A. The Catalyst switches have default configurations set up so that they can perform their basic switching roles without any further configurations. B is incorrect, as setting up an IP address would assist you in remote management via telnet, but isn't required. C is incorrect, as you do not need a router unless you need to get traffic outside your network segment. D is incorrect, as the Cisco IOS is not required for switches to function. In fact, some Catalyst switches do not have the IOS running.

  6. Answer: B. The prompt Router# indicates the router is in Privileged EXEC mode. A is incorrect, as this prompt indicates that you are in User EXEC mode. C is incorrect, as this is not a valid prompt. D is incorrect, as this is not a valid prompt.

  7. Answer: B. The > tells you that you are in User EXEC mode. A is incorrect, as you are not in Privileged mode. C is incorrect, as you can have the User mode prompt without configuring anything on a CAT 1900 switch. D is incorrect, as the > prompt does not indicate any hardware failures.

  8. Answer: C. The hostname command will assign a name to your device. A is incorrect, as enable gets you into privileged mode on the switch. B is incorrect, as the hostname command is one word, not two. D is incorrect, as this is not a valid command.

  9. Answer: D. First you must enter Privileged mode. Next you would enter Global Configuration mode. Finally, you would specify the IP address and subnet mask. A is incorrect, as you are not in the correct mode, nor are you issuing the correct command sequence. B is incorrect, as you are not in the correct mode to issue the command. The command itself is accurate. C is incorrect, as you would not have specified a subnet mask parameter.

  10. Answer: C. The command clock ? will give you all the parameters (syntax) that follows after the Clock main command. A is incorrect, as cl? will simply tell you what commands start with cl. B is incorrect, as the IOS will attempt to clarify all commands that start with clock, which is the actual command here. D is incorrect, as you will get an invalid command error message.

  11. Answer: B. The command banner motd [delimiting character] is what sets up a displayed message when you login to a router. A is incorrect, as the command is banner motd. C is incorrect, as you must issue the command in Global Configuration mode, not Privileged mode. D is incorrect, as that is an invalid command.

  12. Answer: A, C, and D. You can telnet into a Cisco router if you know the IP address of one of the interfaces or the name of the router with DNS running. You can connect with a rollover cable to the Console port. You can also dial in via modem through an AUX port. B is incorrect, as FTP would merely allow you to download a configuration.

  13. Answer: C. The console password requires anyone who attempts to plug a rollover serial cable into the console port to provide a password to log on. A is incorrect, as a vty is a virtual port or telnet port. B is incorrect, as there are no interface passwords. D is incorrect, as the Enable password prevents unauthorized users from entering privileged mode.

  14. Answer: D. You probably have the baud rate set too low. The baud rate on a console port needs to be 9600bps. A is incorrect, as you must use an RJ-45 rollover cable. You cannot change the connectors. B is incorrect, as you will more than likely encounter the same issue with any other terminal program. C is incorrect, as you rarely, if ever, want to restart the router and reset it back to the beginning.

  15. Answer: A. The show running-config command will show you all currently running configurations in RAM. B is incorrect, as you would see similar output; however, this shows the Current configuration. C is incorrect, as that command shows you the routing table on your router. D is incorrect, as the show version command gives you the up-to-date information on which IOS you are running, as well as the configuration register settings.

  16. Answer: B. You would give the East router the username of the router to which you want to authenticate. In this case, it would be West. A is incorrect, as East would be the hostname of the router, not the username. C and D are incorrect, as neither of these routers are mentioned as possible connections. If there were routers named North and South, the East router would need usernames for both of them.

  17. Answer: C. HDLC (High Level Data Link Control) is the default serial encapsulation on Cisco routers. A is incorrect, as you must configure your Cisco router for PPP. B is incorrect, as you must specify SLIP as an encapsulation. D is incorrect, as ATM is ordered through a service provider and is not the default encapsulation.

  18. Answer: C. CHAP (Challenge Handshake Authentication Protocol) requires a three-way handshake. It requires a challenge, reply, and Accept/Reject response. A is incorrect, as there are no one-way authentications. B is incorrect, as CHAP has three-way, and PAP (Password Authentication Protocol) uses a two-way handshake. D is incorrect, as all authentication protocols need mutual agreement.

  19. Answer: B. The order of steps is

    1. Link Establishment

    2. Authentication (optional)

    3. Network layer protocol establishment

    A is incorrect, as authentication occurs after link establishment. C is incorrect, as authentication must occur before Layer 3 (network) establishment. D is incorrect, as authentication, although optional, occurs before the link is fully established and the interface is up.

  20. Answer: A. This output is generated by the show version command. It gives you the current version of the IOS that is running, as well as other information about the router. B is incorrect, as this does not show the currently running configuration. C is incorrect, as this does not show the configuration that is saved in NVRAM. D is incorrect, as there is no such command.

  21. Answer: D. The show ip interface brief command gives you a summary of all interfaces on the router. This is a good command to use to identify any issues with your interfaces' connectivity. A is incorrect, as this would give you detailed information on interface Ethernet 0/0. B is incorrect, as this is not a valid command. C is incorrect, as this command would give you detailed information about serial interface 0/1.

  22. Answer: D. You'll notice that one router is running HDLC while the other is running PPP. They will not be able to communicate. A is incorrect, as both have addresses that are on the appropriate network. B is incorrect, as routers that are directly connected do not need a routing protocol to communicate. C is incorrect, as you notice that on both routers, the lines are "up," which means that there is electrical connectivity (Layer 1).

  23. Answers: A, B, and D. You can copy your running-config to NVRAM (startup-config), the flash memory (if there is room), and to a RCP server (Remote Copy Protocol). C is incorrect, as correct syntax for a copy command is source to destination. Because you are copying from your running-config, that is the source, not the destination.

  24. Answers: A, D, and E. Frame relay, Point-to-Point Protocol (PPP), and HDLC are all WAN encapsulation protocols. B is incorrect, as Ethernet is a LAN encapsulation. C is incorrect, as token ring is a LAN encapsulation, as well.

  25. Answer: B. The command service password-encryption will hash all of the system passwords that are set. A is incorrect, as you cannot issue this command at the Privileged mode prompt. It must be done in Global Configuration mode. C is incorrect, as this command will not work in Privileged mode, and will not encrypt all of the passwords. D is incorrect, as this command will only give you an encrypted Privileged mode password, not all of the system passwords.

  26. Answer: D. You must first go to the vty line that you want to put the password on, and then use the password command. You finish by specifying that users must login with the password with the login command. A is incorrect, as it is the correct method to configure a password on the console interface, not Telnet. B is incorrect, as the second command typed is invalid. C is incorrect, as the command for the password is incorrect. You would not use the enable secret command here.

  27. Answer: A. The clockrate command sets the clocking, or physical speed of the interface. It establishes the DCE side of a serial connection. It acts as sort of a metronome that specifies the timing of sending data. B is incorrect, as keepalives are sent on Ethernet interfaces. C is incorrect, as the advertised bandwidth of an interface is set with the bandwidth command. D is incorrect, as you would use the Clock command to set the time on your router, or you can have it set to receive its time from an NNTP server.

  28. Answer: D. There are five vty (Telnet) lines established by default on a Cisco router. They start at vty 0. A is incorrect, as this is an invalid command. B is incorrect, as this would allow you to configure your Ethernet interface, not Telnet lines. C is incorrect, as the numbering of the vty lines starts at 0, not 1.

  29. Answers: A and D. You can issue show commands from User mode (>) or Privileged mode (#). B is incorrect, as you cannot issue show commands from global configuration mode. C is incorrect, as you cannot issue show commands from Route Protocol mode. E is incorrect, as ROMON mode, or RomMonitor, is a low-level maintenance utility that helps bring back a corrupted router's IOS image.

  30. Answer: B. Older versions of the IOS do not support encrypted Privileged mode passwords. By placing an Enable password, you would still have a way to keep people out of Privileged mode if reverting to an older IOS. A is incorrect, as applications do not use Privileged mode passwords to access a Cisco router. C is incorrect, as the router ignores the Enable password after the Enable Secret password is configured. D is incorrect, as you would only type the Enable Secret password to access Privileged mode.

  31. Answer: C. The keyboard shortcut of Ctrl+Z will bring you back to Privileged mode. A is incorrect, as this is the method to suspend a Telnet session. B is incorrect, as this is one of the ways to stop a process from running. D is incorrect, as this will merely move you back one mode. In this case, you would merely go back to Global Configuration mode.

  32. Answers: A, B, and E. The NCPs can be calculated, such as IPXCP, IPCP, and other Layer 3 protocols. CHAP authentication and Multilink Protocol are options that can also be negotiated during the LCP portion. C is incorrect, as UDP is a Layer 4 protocol, and PPP does not work at Layer 4. D is incorrect, as Q.931 is a signaling standard used by ISDN.

  33. Answer: D. Reloading the router will force the router to reboot and load the configuration in the router's NVRAM. A is incorrect, as this will place you into the router configuration setup script. B is incorrect, as this will copy your currently running configuration into NVRAM. C is incorrect, as this will merely "merge" the saved configuration with the currently running configuration. If there are changes made to the running configuration that were not addressed in your saved configuration, they will remain and not be overwritten.

  34. Answers: A, B, and C. Cisco's IOS provides connectivity, reliability, and security for your Cisco devices. This includes support for network protocols such as IP, IPX, AppleTalk, and more. D is incorrect, as you must purchase a Web management program such as CiscoWorks.

  35. Answer: B. The correct baud rate is 9600, thus B is the correct answer. A, C, and D are incorrect baud rate settings and will cause your screen to incorrectly display information from your console port.

  36. Answer: A. You must have an IP address configured on an interface for a router or on a Management VLAN for a Catalyst switch. B is incorrect, as Simple Network Management Protocol (SNMP) is not required for Telnet. C is incorrect, as Cisco Discovery Protocol (CDP) is not required for Telnet to work. D is incorrect, as Cisco Devices have five vty ports configured by default.

  37. Answer: D. The disable command will take you from Privileged EXEC mode back to User mode. A is incorrect, as this is the command that will take you from User mode to Privileged mode. B is incorrect, as this will log you out of your connection. C is incorrect, as this command places you in Global Configuration mode.

  38. Answer: C. You will issue the ip address command in Global Configuration mode for a Catalyst 1900 series. A is incorrect, as it is an incomplete command, and it is at the wrong prompt. B is incorrect, as the command is issued at Global Configuration mode, not Privileged mode. D is incorrect, as this would be the method to configure the IP address for a Catalyst 2950.

  39. Answer: B. The show flash command gives you the contents of the flash memory, as well as the amount of remaining memory. A is incorrect, as this command would show all the configurations stored in NVRAM. C is incorrect, as this is not a valid command. D is incorrect, as show version will give you the currently running IOS image and information about the router, such as uptime and configuration register settings.

  40. Answer: A. The show ip command will give you the IP address, subnet mask, and default gateway of the Catalyst switch. B is the incorrect answer, as this would give you the information on other switches. C is incorrect, as this command is not valid on a switch. D is incorrect, as this command shows you the currently running software and other parameters, but not the IP address on the 1900 switch.

  41. Answer: C. You will be taken to the System Configuration dialog if there are no configurations saved in NVRAM. A is incorrect, as you would be taken to ROMON mode if the IOS is corrupted. B is incorrect, as missing parameters will not start the System Configuration dialog. D is incorrect, as the question stated that you saw the output after powering up the router. You can get this text if you issue that command, but that would have happened after you had logged in.

  42. Answer: A. show con does not have enough characters for the IOS to finish the command. B is incorrect, as you would see the incomplete command output. C is incorrect, as this would produce the unknown command output. D is incorrect, as context-sensitive help requires the use of the ?.

  43. Answer: C. The dollar sign ($) indicates that there is text to the left of the symbol. A is incorrect, as the (^) symbol typically indicates where a command has erred. B is incorrect, as commands longer than one line are allowed. D is incorrect, as the router will not shorten any commands unless you have typed in a shortened version, such as config t for configure terminal.

  44. Answer: D. The history size command will permanently alter the command history buffer. A is incorrect, as this command will only adjust the buffer for the current session. B is incorrect, as you cannot issue the history size command from Privileged mode. C is incorrect, as you would not issue the terminal history command from Global Configuration mode, and it is the wrong command as well.

  45. Answers: A and C. You can view the descriptions placed on the interfaces with the show interfaces command or show running-config. B is incorrect, as the show flash command shows the IOS images and any configurations saved to flash memory. D is incorrect, as this command gives you all the running routing protocols, such as RIP or IGRP.

  46. Answer: B. The logging synchronous command will enable the IOS to retype your input after displaying a console message. This will not interrupt your command. A is incorrect, as exec-timeout sets how long a session can remain idle without logging off the user. C is incorrect, as this command merely brings you to Line Configuration mode. D is incorrect, as this is an invalid command.

  47. 47 -Answer: D. This is the command issued on a 7000 or 7500 Cisco router with a VIP card. It has a slot, port adapter, and port number. A, B, and C are incorrect definitions.

  48. Answer: D. You issue the clockrate command in Interface Configuration mode, and it must be set in bits per second. A and B are incorrect, as the bandwidth command is only good for the advertised bandwidth. C is incorrect, as you must specify the speed in bits per second, not Kbps.

  49. Answer: A. You would use the encapsulation command in Interface Configuration mode—for example: router1(config-if)#encapsulation frame-relay. B is incorrect, as you would issue the command in Interface Configuration mode. C is incorrect, as you can only issue limited show commands in User mode. D is incorrect, as you can enter configuration modes and perform router maintenance.

  50. Answer: B. All your passwords will be shown in encrypted form after issuing the service password-encryption command. A is incorrect, as the encrypted passwords are shown in a hashed format. C is incorrect, as the rest of the output looks correct. D is incorrect, as the enable secret command gives you an encrypted Privilege mode password, not all the passwords.

Pearson IT Certification Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from Pearson IT Certification and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about Pearson IT Certification products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites; develop new products and services; conduct educational research; and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by Adobe Press. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.pearsonitcertification.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020