SlideShare a Scribd company logo
Chapter 5

True/False
Indicate whether the statement is true or false.

____    1. Routers operate at the Application layer of the OSI reference model.

____    2. In addition to the AUX and the console ports, you can use five virtual terminals (VTY) to configure a Cisco
           router.

____    3. The system configuration dialog presents a series of prompts that guide you through the initial configuration
           for the router.

____    4. The enable password is stored in an encrypted form for increased security.

____    5. The content of ROM is maintained even when the router is rebooted.


Multiple Choice
Identify the choice that best completes the statement or answers the question.

____    6. Network administrators typically access the router directly through the console port (also known as the ____)
           located on the back of the router.
           a. DB-9                                         c. console
           b. VTY                                          d. AUX
____    7. The console port connects directly to a PC through a(n) ____ rollover cable
           a. RJ-45 to RJ-10                               c. RJ-9 to RJ-45
           b. RJ-45 to RJ-45                               d. RJ-9 to RJ-10

____    8. The ____ port allows a remote administrator to dial into the router through an external modem.
           a. auxiliary                                   c. virtual
           b. console                                     d. terminal
____    9. You can access the system configuration dialog by typing the ____ command at the privileged EXEC prompt.
           a. init                                        c. dialog
           b. config                                      d. setup
____ 10. By default, a Cisco router’s host name is ____.
         a. host                                         c. cisco01
         b. router                                       d. tiger
____ 11. When the prompt displayed is the greater than symbol, the router is in ____ EXEC mode.
         a. privileged                                  c. superuser
         b. admin                                       d. user

____ 12. User mode does not allow you to configure the router. To do this, you must go into the ____ EXEC mode.
         a. privileged                                  c. user
         b. config                                      d. router
____ 13. To enter privileged EXEC, you can type the ____ command at the user mode prompt.
         a. sudo                                       c. enable
b. setup                                        d. privileged
____ 14. With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you
         access the router.
         a. global                                    c. router
         b. interface                                 d. line
____ 15. If you want to remove the enable secret password, you can type ____ at the global configuration mode
         prompt.
         a. enable secret off                           c. no enable secret
         b. enable off                                  d. no secret
____ 16. The editing command ____ moves the cursor to the end of the current line.
         a. Ctrl+E                                   c. Esc+B
         b. Ctrl+F                                   d. Esc+F
____ 17. The editing command ____ moves the cursor one character to the right.
         a. Ctrl+E                                   c. Esc+B
         b. Ctrl+F                                   d. Esc+F

____ 18. The ____ command is typically used as a legal means of warning anyone who accesses the banner that they
         will be held accountable.
         a. banner legal                               c. banner motd
         b. legal motd                                 d. motd on

____ 19. You can configure a description for each of the interfaces physically attached to your router by using the ____
         command.
         a. banner                                        c. motd
         b. description                                   d. interface

____ 20. Use the ____ command in enable mode to configure the time.
         a. clock set                                c. clock on
         b. time set                                 d. time on
____ 21. ____ is a type of erasable, programmable, read-only memory (EPROM).
         a. ROM                                         c. DRAM
         b. NVRAM                                       d. Flash memory
____ 22. ____ contains the working copy of the current Cisco IOS and is the component that initializes the IOS for
         normal router operations.
         a. ROM                                         c. DRAM
         b. Flash memory                                d. NVRAM
____ 23. ____ is a special type of RAM that is not cleared when the router is rebooted.
         a. DRAM                                         c. ROM
         b. Flash memory                                 d. NVRAM
____ 24. The startup configuration file for the router is stored in ____ by default.
         a. NVRAM                                           c. flash memory
         b. ROM                                             d. DRAM
____ 25. Random access memory (RAM), also known as ____, is a volatile hardware component because its
         information is not maintained in the event of a router reboot.
         a. ROM                                           c. DRAM
b. NVRAM                                       d. EPROM
____ 26. The command ____ displays the current startup configuration file on the router, which is stored in NVRAM.
         a. show running-config                        c. show buffers
         b. show memory                                d. show startup-config


Completion
Complete each statement.

      27. Network administrators commonly configure and interact with a Cisco router via the Cisco
          ____________________.

      28. Privileged EXEC mode is called ____________________ mode because you must enter the enable
          command to access it.

      29. You can turn off the enhanced editing features by typing ____________________ at either the user EXEC or
          the privileged EXEC prompts.

      30. When entering the time zone, you must include the name of the time zone and the offset from the
          ____________________.

      31. A router’s ____________________ loads the bootstrap program that initializes the router’s basic hardware
          components.


Matching

           Match each item with a statement below:
           a. Cisco IOS                                   f.   login command
           b. EXEC                                        g.   Ctrl+A
           c. CiscoWorks                                  h.   Banner
           d. Global configuration mode                   i.   Interface description
           e. Interface configuration mode
____ 32. specifies that users must log in when they access the console line
____ 33. helps you remember which network the interface services
____ 34. network management software used to manage Cisco routers
____ 35. allows you to configure the Ethernet and serial interfaces on your router
____ 36. editing command that moves the cursor to the beginning of the current line
____ 37. the software that interprets the Cisco IOS commands
____ 38. basic configuration mode in Cisco IOS
____ 39. provides a command-line interface (CLI), which allows network operators to check the status of the router
         and network administrators to manage and configure the router
____ 40. message that you can configure to display each time someone attempts to log in to the router
Short Answer

     41. What are some of the benefits of routing?

     42. What are some of the tasks that can be performed at the privileged EXEC mode?

     43. How can you set both the enable password and the enable secret password?

     44. Describe the command history feature.

     45. How can you configure a router host name?

     46. How can you configure a router’s banner?

     47. Describe the router’s ROM.

     48. Describe a router’s flash memory.

     49. Describe a router’s NVRAM component.

     50. What are some of the types of interfaces in a Cisco router?

More Related Content

What's hot

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP QuestionsDsunte Wilson
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsDsunte Wilson
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Treegopi1985
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
JAIGANESH SEKAR
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
Eng. Emad Al-Atoum
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Sachii Dosti
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 StpF.l. Yu
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz student
Yaser Rahmati
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routingAshraf Uddin
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
Aniket Thakur
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
vtunotesbysree
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
CAS
 

What's hot (20)

CCNA TCP/IP Questions
CCNA TCP/IP QuestionsCCNA TCP/IP Questions
CCNA TCP/IP Questions
 
CCNA Introducing Networks Questions
CCNA Introducing Networks QuestionsCCNA Introducing Networks Questions
CCNA Introducing Networks Questions
 
Chapter 10
Chapter 10Chapter 10
Chapter 10
 
05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree05 Bcmsn Spanning Tree
05 Bcmsn Spanning Tree
 
Chapter 08
Chapter 08Chapter 08
Chapter 08
 
Ch22
Ch22Ch22
Ch22
 
Ec8551 communication networks mcq question bank
Ec8551   communication networks mcq question bank Ec8551   communication networks mcq question bank
Ec8551 communication networks mcq question bank
 
CCNA Dec, 2015 Questions
CCNA Dec, 2015 QuestionsCCNA Dec, 2015 Questions
CCNA Dec, 2015 Questions
 
Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)Subneting and vlsm ntpg (1)
Subneting and vlsm ntpg (1)
 
Networking
NetworkingNetworking
Networking
 
M Qi Series Linux
M Qi Series LinuxM Qi Series Linux
M Qi Series Linux
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Inter quiz
Inter quizInter quiz
Inter quiz
 
第15讲 Stp
第15讲 Stp第15讲 Stp
第15讲 Stp
 
CCNA practice quiz student
CCNA practice quiz studentCCNA practice quiz student
CCNA practice quiz student
 
Dynamic source routing
Dynamic source routingDynamic source routing
Dynamic source routing
 
Basic linux commands
Basic linux commandsBasic linux commands
Basic linux commands
 
Presentation on copy
Presentation  on   copyPresentation  on   copy
Presentation on copy
 
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
VTU 8TH SEM CSE ADHOC NETWORKS SOLVED PAPERS OF JUNE-2014 DEC-14 & JUNE-2015
 
RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2RRB JE Stage 2 Computer and Applications Questions Part 2
RRB JE Stage 2 Computer and Applications Questions Part 2
 

Viewers also liked

CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsDsunte Wilson
 
Energie nucleaire
Energie nucleaireEnergie nucleaire
Energie nucleaireCinemaTICE
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
Dsunte Wilson
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing ProtocolsDsunte Wilson
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsDsunte Wilson
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network DevicesDsunte Wilson
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationDsunte Wilson
 
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 cLe fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 cjlealleon
 

Viewers also liked (11)

CCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration QuestionsCCNA Basic Switching and Switch Configuration Questions
CCNA Basic Switching and Switch Configuration Questions
 
Energie nucleaire
Energie nucleaireEnergie nucleaire
Energie nucleaire
 
Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6Tips and Tricks of Toad for Oracle 10.6
Tips and Tricks of Toad for Oracle 10.6
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
CCNA TCP/IP
CCNA TCP/IPCCNA TCP/IP
CCNA TCP/IP
 
CCNA Routing Protocols
CCNA Routing ProtocolsCCNA Routing Protocols
CCNA Routing Protocols
 
CCNA Access Lists
CCNA Access ListsCCNA Access Lists
CCNA Access Lists
 
CCNA Advanced Routing Protocols
CCNA Advanced Routing ProtocolsCCNA Advanced Routing Protocols
CCNA Advanced Routing Protocols
 
CCNA Network Devices
CCNA Network DevicesCCNA Network Devices
CCNA Network Devices
 
CCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch ConfigurationCCNA Basic Switching and Switch Configuration
CCNA Basic Switching and Switch Configuration
 
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 cLe fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
Le fonctionnement d´une centrale nucleaire. jaime sánchez.6 c
 

Similar to CCNA Router and IOS Basics Questions

Embedded based microprocessor system one marks 50 questions and answers by S...
Embedded based microprocessor system one marks 50 questions and answers  by S...Embedded based microprocessor system one marks 50 questions and answers  by S...
Embedded based microprocessor system one marks 50 questions and answers by S...
eeducations ever
 
0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit
Russell Sanford
 
Bc0042 os-mqp
Bc0042 os-mqpBc0042 os-mqp
Bc0042 os-mqp
trueranjit
 
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
scribdsituation719
 
CUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : NotesCUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : Notes
Subhajit Sahu
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
CarmenLamdegil
 
Exploiting Llinux Environment
Exploiting Llinux EnvironmentExploiting Llinux Environment
Exploiting Llinux EnvironmentEnrico Scapin
 
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
GangSeok Lee
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersProfessorLance
 
000-232 Exams
000-232 Exams000-232 Exams
000-232 Exams
lisabrandon23
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersProfessorLance
 
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36   privilege escalation exploitExploit access root to kernel 2.6.32 2.6.36   privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploitCarlos Eduardo
 
Linux, PHP, SMS - USSD Examination
Linux, PHP,  SMS - USSD ExaminationLinux, PHP,  SMS - USSD Examination
Linux, PHP, SMS - USSD Examination
tawi123
 
Roll your own toy unix clone os
Roll your own toy unix clone osRoll your own toy unix clone os
Roll your own toy unix clone os
eramax
 
C programming session9 -
C programming  session9 -C programming  session9 -
C programming session9 -
Keroles karam khalil
 
Intro2 Cuda Moayad
Intro2 Cuda MoayadIntro2 Cuda Moayad
Intro2 Cuda Moayad
Moayadhn
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
Soporte Yottatec
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1Tai Lam
 
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
Akihiro Suda
 
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfChapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
akknit
 

Similar to CCNA Router and IOS Basics Questions (20)

Embedded based microprocessor system one marks 50 questions and answers by S...
Embedded based microprocessor system one marks 50 questions and answers  by S...Embedded based microprocessor system one marks 50 questions and answers  by S...
Embedded based microprocessor system one marks 50 questions and answers by S...
 
0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit0x01 - Breaking into Linux VMs for Fun and Profit
0x01 - Breaking into Linux VMs for Fun and Profit
 
Bc0042 os-mqp
Bc0042 os-mqpBc0042 os-mqp
Bc0042 os-mqp
 
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf0x01 - Breaking into Linux VMs for Fun and Profit.pdf
0x01 - Breaking into Linux VMs for Fun and Profit.pdf
 
CUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : NotesCUDA by Example : Introduction to CUDA C : Notes
CUDA by Example : Introduction to CUDA C : Notes
 
Final exam review_questions
Final exam review_questionsFinal exam review_questions
Final exam review_questions
 
Exploiting Llinux Environment
Exploiting Llinux EnvironmentExploiting Llinux Environment
Exploiting Llinux Environment
 
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
[2007 CodeEngn Conference 01] dual5651 - Windows 커널단의 후킹
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answers
 
000-232 Exams
000-232 Exams000-232 Exams
000-232 Exams
 
Comp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answersComp 129 final exam 100% correct answers
Comp 129 final exam 100% correct answers
 
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36   privilege escalation exploitExploit access root to kernel 2.6.32 2.6.36   privilege escalation exploit
Exploit access root to kernel 2.6.32 2.6.36 privilege escalation exploit
 
Linux, PHP, SMS - USSD Examination
Linux, PHP,  SMS - USSD ExaminationLinux, PHP,  SMS - USSD Examination
Linux, PHP, SMS - USSD Examination
 
Roll your own toy unix clone os
Roll your own toy unix clone osRoll your own toy unix clone os
Roll your own toy unix clone os
 
C programming session9 -
C programming  session9 -C programming  session9 -
C programming session9 -
 
Intro2 Cuda Moayad
Intro2 Cuda MoayadIntro2 Cuda Moayad
Intro2 Cuda Moayad
 
CCA security answers chapter 2 test
CCA security answers chapter 2 testCCA security answers chapter 2 test
CCA security answers chapter 2 test
 
Cisco labs practical1
Cisco labs practical1Cisco labs practical1
Cisco labs practical1
 
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode[DockerCon 2020] Hardening Docker daemon with Rootless Mode
[DockerCon 2020] Hardening Docker daemon with Rootless Mode
 
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdfChapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
Chapter 1 Introduction to Computers- Programs- and Java 1- A Java prog.pdf
 

More from Dsunte Wilson

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
Dsunte Wilson
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
Dsunte Wilson
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
Dsunte Wilson
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced SwitchingDsunte Wilson
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame RelayDsunte Wilson
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network ServicesDsunte Wilson
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationDsunte Wilson
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS BasicsDsunte Wilson
 

More from Dsunte Wilson (12)

SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection CenterSYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
SYMANTEC ENDPOINT PROTECTION Interfacing the SEPM with Protection Center
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
SYMANTEC ENDPOINT PROTECTION Configuring Replication and Failover and Load Ba...
 
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and ReportingSYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
SYMANTEC ENDPOINT PROTECTION Advanced Monitoring and Reporting
 
IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction IBM BladeCenter Fundamentals Introduction
IBM BladeCenter Fundamentals Introduction
 
SYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration IntroductionSYMANTEC ENDPOINT PROTECTION Administration Introduction
SYMANTEC ENDPOINT PROTECTION Administration Introduction
 
CCNA Advanced Switching
CCNA Advanced SwitchingCCNA Advanced Switching
CCNA Advanced Switching
 
CCNA PPP and Frame Relay
CCNA PPP and Frame RelayCCNA PPP and Frame Relay
CCNA PPP and Frame Relay
 
CCNA Network Services
CCNA Network ServicesCCNA Network Services
CCNA Network Services
 
CCNA Router Startup and Configuration
CCNA Router Startup and ConfigurationCCNA Router Startup and Configuration
CCNA Router Startup and Configuration
 
CCNA Router and IOS Basics
CCNA Router and IOS BasicsCCNA Router and IOS Basics
CCNA Router and IOS Basics
 
CCNA IP Addressing
CCNA IP AddressingCCNA IP Addressing
CCNA IP Addressing
 

Recently uploaded

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 

Recently uploaded (20)

How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 

CCNA Router and IOS Basics Questions

  • 1. Chapter 5 True/False Indicate whether the statement is true or false. ____ 1. Routers operate at the Application layer of the OSI reference model. ____ 2. In addition to the AUX and the console ports, you can use five virtual terminals (VTY) to configure a Cisco router. ____ 3. The system configuration dialog presents a series of prompts that guide you through the initial configuration for the router. ____ 4. The enable password is stored in an encrypted form for increased security. ____ 5. The content of ROM is maintained even when the router is rebooted. Multiple Choice Identify the choice that best completes the statement or answers the question. ____ 6. Network administrators typically access the router directly through the console port (also known as the ____) located on the back of the router. a. DB-9 c. console b. VTY d. AUX ____ 7. The console port connects directly to a PC through a(n) ____ rollover cable a. RJ-45 to RJ-10 c. RJ-9 to RJ-45 b. RJ-45 to RJ-45 d. RJ-9 to RJ-10 ____ 8. The ____ port allows a remote administrator to dial into the router through an external modem. a. auxiliary c. virtual b. console d. terminal ____ 9. You can access the system configuration dialog by typing the ____ command at the privileged EXEC prompt. a. init c. dialog b. config d. setup ____ 10. By default, a Cisco router’s host name is ____. a. host c. cisco01 b. router d. tiger ____ 11. When the prompt displayed is the greater than symbol, the router is in ____ EXEC mode. a. privileged c. superuser b. admin d. user ____ 12. User mode does not allow you to configure the router. To do this, you must go into the ____ EXEC mode. a. privileged c. user b. config d. router ____ 13. To enter privileged EXEC, you can type the ____ command at the user mode prompt. a. sudo c. enable
  • 2. b. setup d. privileged ____ 14. With ____ configuration mode, you can configure the virtual terminals, console, and AUX lines that let you access the router. a. global c. router b. interface d. line ____ 15. If you want to remove the enable secret password, you can type ____ at the global configuration mode prompt. a. enable secret off c. no enable secret b. enable off d. no secret ____ 16. The editing command ____ moves the cursor to the end of the current line. a. Ctrl+E c. Esc+B b. Ctrl+F d. Esc+F ____ 17. The editing command ____ moves the cursor one character to the right. a. Ctrl+E c. Esc+B b. Ctrl+F d. Esc+F ____ 18. The ____ command is typically used as a legal means of warning anyone who accesses the banner that they will be held accountable. a. banner legal c. banner motd b. legal motd d. motd on ____ 19. You can configure a description for each of the interfaces physically attached to your router by using the ____ command. a. banner c. motd b. description d. interface ____ 20. Use the ____ command in enable mode to configure the time. a. clock set c. clock on b. time set d. time on ____ 21. ____ is a type of erasable, programmable, read-only memory (EPROM). a. ROM c. DRAM b. NVRAM d. Flash memory ____ 22. ____ contains the working copy of the current Cisco IOS and is the component that initializes the IOS for normal router operations. a. ROM c. DRAM b. Flash memory d. NVRAM ____ 23. ____ is a special type of RAM that is not cleared when the router is rebooted. a. DRAM c. ROM b. Flash memory d. NVRAM ____ 24. The startup configuration file for the router is stored in ____ by default. a. NVRAM c. flash memory b. ROM d. DRAM ____ 25. Random access memory (RAM), also known as ____, is a volatile hardware component because its information is not maintained in the event of a router reboot. a. ROM c. DRAM
  • 3. b. NVRAM d. EPROM ____ 26. The command ____ displays the current startup configuration file on the router, which is stored in NVRAM. a. show running-config c. show buffers b. show memory d. show startup-config Completion Complete each statement. 27. Network administrators commonly configure and interact with a Cisco router via the Cisco ____________________. 28. Privileged EXEC mode is called ____________________ mode because you must enter the enable command to access it. 29. You can turn off the enhanced editing features by typing ____________________ at either the user EXEC or the privileged EXEC prompts. 30. When entering the time zone, you must include the name of the time zone and the offset from the ____________________. 31. A router’s ____________________ loads the bootstrap program that initializes the router’s basic hardware components. Matching Match each item with a statement below: a. Cisco IOS f. login command b. EXEC g. Ctrl+A c. CiscoWorks h. Banner d. Global configuration mode i. Interface description e. Interface configuration mode ____ 32. specifies that users must log in when they access the console line ____ 33. helps you remember which network the interface services ____ 34. network management software used to manage Cisco routers ____ 35. allows you to configure the Ethernet and serial interfaces on your router ____ 36. editing command that moves the cursor to the beginning of the current line ____ 37. the software that interprets the Cisco IOS commands ____ 38. basic configuration mode in Cisco IOS ____ 39. provides a command-line interface (CLI), which allows network operators to check the status of the router and network administrators to manage and configure the router ____ 40. message that you can configure to display each time someone attempts to log in to the router
  • 4. Short Answer 41. What are some of the benefits of routing? 42. What are some of the tasks that can be performed at the privileged EXEC mode? 43. How can you set both the enable password and the enable secret password? 44. Describe the command history feature. 45. How can you configure a router host name? 46. How can you configure a router’s banner? 47. Describe the router’s ROM. 48. Describe a router’s flash memory. 49. Describe a router’s NVRAM component. 50. What are some of the types of interfaces in a Cisco router?