SlideShare a Scribd company logo
1 of 4
Download to read offline
Chapter 5

True/False
Indicate whether the statement is true or false.

____    1. Routers operate at the Application layer of the OSI reference model.

____    2. In addition to the AUX and the console ports, you can use five virtual terminals (VTY) to configure a Cisco
           router.

____    3. The system configuration dialog presents a series of prompts that guide you through the initial configuration
           for the router.

____    4. The enable password is stored in an encrypted form for increased security.

____    5. The content of ROM is maintained even when the router is rebooted.


Multiple Choice
Identify the choice that best completes the statement or answers the question.

____    6. Network administrators typically access the router directly through the console port (also known as the ____)
           located on the back of the router.
           a. DB-9                                         c. console
           b. VTY                                          d. AUX
____    7. The console port connects directly to a PC through a(n) ____ rollover cable
           a. RJ-45 to RJ-10                               c. RJ-9 to RJ-45
           b. RJ-45 to RJ-45                               d. RJ-9 to RJ-10

____    8. The ____ port allows a remote administrator to dial into the router through an external modem.
           a. auxiliary                                   c. virtual
           b. console                                     d. terminal
____    9. You can access the system configuration dialog by typing the ____ command at the privileged EXEC prompt.
           a. init                                        c. dialog
           b. config                                      d. setup
____ 10. By default, a Cisco router’s host name is ____.
         a. host                                         c. cisco01
         b. router                                       d. tiger
____ 11. When the prompt displayed is the greater than symbol, the router is in ____ EXEC mode.
         a. privileged                                  c. superuser
         b. admin                                       d. user

____ 12. User mode does not allow you to configure the router. To do this, you must go into the ____ EXEC mode.
         a. privileged                                  c. user
         b. config                                      d. router
____ 13. To enter privileged EXEC, you can type the ____ command at the user mode prompt.
         a. sudo                                       c. enable
b. setup                                        d. privileged
____ 14. With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you
         access the router.
         a. global                                    c. router
         b. interface                                 d. line
____ 15. If you want to remove the enable secret password, you can type ____ at the global configuration mode
         prompt.
         a. enable secret off                           c. no enable secret
         b. enable off                                  d. no secret
____ 16. The editing command ____ moves the cursor to the end of the current line.
         a. Ctrl+E                                   c. Esc+B
         b. Ctrl+F                                   d. Esc+F
____ 17. The editing command ____ moves the cursor one character to the right.
         a. Ctrl+E                                   c. Esc+B
         b. Ctrl+F                                   d. Esc+F

____ 18. The ____ command is typically used as a legal means of warning anyone who accesses the banner that they
         will be held accountable.
         a. banner legal                               c. banner motd
         b. legal motd                                 d. motd on

____ 19. You can configure a description for each of the interfaces physically attached to your router by using the ____
         command.
         a. banner                                        c. motd
         b. description                                   d. interface

____ 20. Use the ____ command in enable mode to configure the time.
         a. clock set                                c. clock on
         b. time set                                 d. time on
____ 21. ____ is a type of erasable, programmable, read-only memory (EPROM).
         a. ROM                                         c. DRAM
         b. NVRAM                                       d. Flash memory
____ 22. ____ contains the working copy of the current Cisco IOS and is the component that initializes the IOS for
         normal router operations.
         a. ROM                                         c. DRAM
         b. Flash memory                                d. NVRAM
____ 23. ____ is a special type of RAM that is not cleared when the router is rebooted.
         a. DRAM                                         c. ROM
         b. Flash memory                                 d. NVRAM
____ 24. The startup configuration file for the router is stored in ____ by default.
         a. NVRAM                                           c. flash memory
         b. ROM                                             d. DRAM
____ 25. Random access memory (RAM), also known as ____, is a volatile hardware component because its
         information is not maintained in the event of a router reboot.
         a. ROM                                           c. DRAM
b. NVRAM                                       d. EPROM
____ 26. The command ____ displays the current startup configuration file on the router, which is stored in NVRAM.
         a. show running-config                        c. show buffers
         b. show memory                                d. show startup-config


Completion
Complete each statement.

      27. Network administrators commonly configure and interact with a Cisco router via the Cisco
          ____________________.

      28. Privileged EXEC mode is called ____________________ mode because you must enter the enable
          command to access it.

      29. You can turn off the enhanced editing features by typing ____________________ at either the user EXEC or
          the privileged EXEC prompts.

      30. When entering the time zone, you must include the name of the time zone and the offset from the
          ____________________.

      31. A router’s ____________________ loads the bootstrap program that initializes the router’s basic hardware
          components.


Matching

           Match each item with a statement below:
           a. Cisco IOS                                   f.   login command
           b. EXEC                                        g.   Ctrl+A
           c. CiscoWorks                                  h.   Banner
           d. Global configuration mode                   i.   Interface description
           e. Interface configuration mode
____ 32. specifies that users must log in when they access the console line
____ 33. helps you remember which network the interface services
____ 34. network management software used to manage Cisco routers
____ 35. allows you to configure the Ethernet and serial interfaces on your router
____ 36. editing command that moves the cursor to the beginning of the current line
____ 37. the software that interprets the Cisco IOS commands
____ 38. basic configuration mode in Cisco IOS
____ 39. provides a command-line interface (CLI), which allows network operators to check the status of the router
         and network administrators to manage and configure the router
____ 40. message that you can configure to display each time someone attempts to log in to the router
Short Answer

     41. What are some of the benefits of routing?

     42. What are some of the tasks that can be performed at the privileged EXEC mode?

     43. How can you set both the enable password and the enable secret password?

     44. Describe the command history feature.

     45. How can you configure a router host name?

     46. How can you configure a router’s banner?

     47. Describe the router’s ROM.

     48. Describe a router’s flash memory.

     49. Describe a router’s NVRAM component.

     50. What are some of the types of interfaces in a Cisco router?

More Related Content

What's hot

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Treegopi1985
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank JAIGANESH SEKAR
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Sachii Dosti
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 StpF.l. Yu
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz studentYaser Rahmati
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commandsAniket Thakur
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015vtunotesbysree
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2CAS
 

What's hot (20)

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Ch22
Ch22Ch22
Ch22
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Networking
NetworkingNetworking
Networking
 
M Qi Series Linux
M Qi Series LinuxM Qi Series Linux
M Qi Series Linux
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Inter quiz
Inter quizInter quiz
Inter quiz
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 Stp
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz student
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
 
Presentation on copy
Presentation  on   copyPresentation  on   copy
Presentation on copy
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 

Viewers also liked

CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsDsunte Wilson
 
Energie nucleaire
Energie nucleaireEnergie nucleaire
Energie nucleaireCinemaTICE
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Dsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network DevicesDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 cLe fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 cjlealleon
 

Viewers also liked (11)

CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
Energie nucleaire
Energie nucleaireEnergie nucleaire
Energie nucleaire
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 cLe fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
 

Similar to CCNA Router and IOS Basics Questions

Embedded based microprocessor system one marks 50 questions and answers by S...
Embedded based microprocessor system one marks 50 questions and answers  by S...Embedded based microprocessor system one marks 50 questions and answers  by S...
Embedded based microprocessor system one marks 50 questions and answers by S...eeducations ever
 
0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and ProfitRussell Sanford
 
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdfscribdsituation719
 
CUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : NotesCUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : NotesSubhajit Sahu
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questionsCarmenLamdegil
 
Exploiting Llinux Environment
Exploiting Llinux EnvironmentExploiting Llinux Environment
Exploiting Llinux EnvironmentEnrico Scapin
 
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹GangSeok Lee
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersProfessorLance
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersProfessorLance
 
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36   privilege escalation exploitExploit access root to kernel 2.6.32 2.6.36   privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploitCarlos Eduardo
 
Linux, PHP, SMS - USSD Examination
Linux, PHP,  SMS - USSD ExaminationLinux, PHP,  SMS - USSD Examination
Linux, PHP, SMS - USSD Examinationtawi123
 
Roll your own toy unix clone os
Roll your own toy unix clone osRoll your own toy unix clone os
Roll your own toy unix clone oseramax
 
Intro2 Cuda Moayad
Intro2 Cuda MoayadIntro2 Cuda Moayad
Intro2 Cuda MoayadMoayadhn
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 testSoporte Yottatec
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1Tai Lam
 
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless ModeAkihiro Suda
 
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfChapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfakknit
 

Similar to CCNA Router and IOS Basics Questions (20)

Embedded based microprocessor system one marks 50 questions and answers by S...
Embedded based microprocessor system one marks 50 questions and answers  by S...Embedded based microprocessor system one marks 50 questions and answers  by S...
Embedded based microprocessor system one marks 50 questions and answers by S...
 
0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit
 
Bc0042 os-mqp
Bc0042 os-mqpBc0042 os-mqp
Bc0042 os-mqp
 
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
 
CUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : NotesCUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : Notes
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
 
Exploiting Llinux Environment
Exploiting Llinux EnvironmentExploiting Llinux Environment
Exploiting Llinux Environment
 
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answers
 
000-232 Exams
000-232 Exams000-232 Exams
000-232 Exams
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answers
 
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36   privilege escalation exploitExploit access root to kernel 2.6.32 2.6.36   privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
 
Linux, PHP, SMS - USSD Examination
Linux, PHP,  SMS - USSD ExaminationLinux, PHP,  SMS - USSD Examination
Linux, PHP, SMS - USSD Examination
 
Roll your own toy unix clone os
Roll your own toy unix clone osRoll your own toy unix clone os
Roll your own toy unix clone os
 
C programming session9 -
C programming  session9 -C programming  session9 -
C programming session9 -
 
Intro2 Cuda Moayad
Intro2 Cuda MoayadIntro2 Cuda Moayad
Intro2 Cuda Moayad
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1
 
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
 
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfChapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
 

More from Dsunte Wilson

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingDsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionDsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 

More from Dsunte Wilson (12)

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 

Recently uploaded

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 

Recently uploaded (20)

How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 

CCNA Router and IOS Basics Questions

  • 1. Chapter 5 True/False Indicate whether the statement is true or false. ____ 1. Routers operate at the Application layer of the OSI reference model. ____ 2. In addition to the AUX and the console ports, you can use five virtual terminals (VTY) to configure a Cisco router. ____ 3. The system configuration dialog presents a series of prompts that guide you through the initial configuration for the router. ____ 4. The enable password is stored in an encrypted form for increased security. ____ 5. The content of ROM is maintained even when the router is rebooted. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. Network administrators typically access the router directly through the console port (also known as the ____) located on the back of the router. a. DB-9 c. console b. VTY d. AUX ____ 7. The console port connects directly to a PC through a(n) ____ rollover cable a. RJ-45 to RJ-10 c. RJ-9 to RJ-45 b. RJ-45 to RJ-45 d. RJ-9 to RJ-10 ____ 8. The ____ port allows a remote administrator to dial into the router through an external modem. a. auxiliary c. virtual b. console d. terminal ____ 9. You can access the system configuration dialog by typing the ____ command at the privileged EXEC prompt. a. init c. dialog b. config d. setup ____ 10. By default, a Cisco router’s host name is ____. a. host c. cisco01 b. router d. tiger ____ 11. When the prompt displayed is the greater than symbol, the router is in ____ EXEC mode. a. privileged c. superuser b. admin d. user ____ 12. User mode does not allow you to configure the router. To do this, you must go into the ____ EXEC mode. a. privileged c. user b. config d. router ____ 13. To enter privileged EXEC, you can type the ____ command at the user mode prompt. a. sudo c. enable
  • 2. b. setup d. privileged ____ 14. With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you access the router. a. global c. router b. interface d. line ____ 15. If you want to remove the enable secret password, you can type ____ at the global configuration mode prompt. a. enable secret off c. no enable secret b. enable off d. no secret ____ 16. The editing command ____ moves the cursor to the end of the current line. a. Ctrl+E c. Esc+B b. Ctrl+F d. Esc+F ____ 17. The editing command ____ moves the cursor one character to the right. a. Ctrl+E c. Esc+B b. Ctrl+F d. Esc+F ____ 18. The ____ command is typically used as a legal means of warning anyone who accesses the banner that they will be held accountable. a. banner legal c. banner motd b. legal motd d. motd on ____ 19. You can configure a description for each of the interfaces physically attached to your router by using the ____ command. a. banner c. motd b. description d. interface ____ 20. Use the ____ command in enable mode to configure the time. a. clock set c. clock on b. time set d. time on ____ 21. ____ is a type of erasable, programmable, read-only memory (EPROM). a. ROM c. DRAM b. NVRAM d. Flash memory ____ 22. ____ contains the working copy of the current Cisco IOS and is the component that initializes the IOS for normal router operations. a. ROM c. DRAM b. Flash memory d. NVRAM ____ 23. ____ is a special type of RAM that is not cleared when the router is rebooted. a. DRAM c. ROM b. Flash memory d. NVRAM ____ 24. The startup configuration file for the router is stored in ____ by default. a. NVRAM c. flash memory b. ROM d. DRAM ____ 25. Random access memory (RAM), also known as ____, is a volatile hardware component because its information is not maintained in the event of a router reboot. a. ROM c. DRAM
  • 3. b. NVRAM d. EPROM ____ 26. The command ____ displays the current startup configuration file on the router, which is stored in NVRAM. a. show running-config c. show buffers b. show memory d. show startup-config Completion Complete each statement. 27. Network administrators commonly configure and interact with a Cisco router via the Cisco ____________________. 28. Privileged EXEC mode is called ____________________ mode because you must enter the enable command to access it. 29. You can turn off the enhanced editing features by typing ____________________ at either the user EXEC or the privileged EXEC prompts. 30. When entering the time zone, you must include the name of the time zone and the offset from the ____________________. 31. A router’s ____________________ loads the bootstrap program that initializes the router’s basic hardware components. Matching Match each item with a statement below: a. Cisco IOS f. login command b. EXEC g. Ctrl+A c. CiscoWorks h. Banner d. Global configuration mode i. Interface description e. Interface configuration mode ____ 32. specifies that users must log in when they access the console line ____ 33. helps you remember which network the interface services ____ 34. network management software used to manage Cisco routers ____ 35. allows you to configure the Ethernet and serial interfaces on your router ____ 36. editing command that moves the cursor to the beginning of the current line ____ 37. the software that interprets the Cisco IOS commands ____ 38. basic configuration mode in Cisco IOS ____ 39. provides a command-line interface (CLI), which allows network operators to check the status of the router and network administrators to manage and configure the router ____ 40. message that you can configure to display each time someone attempts to log in to the router
  • 4. Short Answer 41. What are some of the benefits of routing? 42. What are some of the tasks that can be performed at the privileged EXEC mode? 43. How can you set both the enable password and the enable secret password? 44. Describe the command history feature. 45. How can you configure a router host name? 46. How can you configure a router’s banner? 47. Describe the router’s ROM. 48. Describe a router’s flash memory. 49. Describe a router’s NVRAM component. 50. What are some of the types of interfaces in a Cisco router?