CCNA ICND 1 Part 2

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Msmith721
M
Msmith721
Community Contributor
Quizzes Created: 2 | Total Attempts: 328
| Attempts: 73
SettingsSettings
Please wait...
Please wait...
About This Quiz

CCNA ICND 1 Part 2 quiz assesses knowledge on common components in IT devices, router functions, and routing processes. It evaluates understanding of routing tables, path determination, and packet handling, crucial for network configuration and troubleshooting.

CCNA ICND 1 Part 2 - Quiz

Quiz Preview

  • 2. 

    What information does the show running-config command provide on a Cisco router?

    • Current (running) configuration in RAM

    • System hardware and names of configuration files

    • Amount of NVRAM used to store the configuration

    • Version of Cisco IOS software running on the router

    Correct Answer
    A. Current (running) configuration in RAM
    Explanation
    The show running-config command provides information about the current (running) configuration in RAM on a Cisco router. It displays the configuration settings that are currently active and being used by the router. This command does not provide information about the system hardware, names of configuration files, amount of NVRAM used, or the version of Cisco IOS software running on the router.

    Rate this question:

  • 3. 

    Which three of the following components are common to routers, switches, and Computers?

    • RAM

    • CPU

    • Motherboard

    • Keyboard

    Correct Answer(s)
    A. RAM
    A. CPU
    A. Motherboard
    Explanation
    RAM, CPU, and motherboard are common components to routers, switches, and computers. RAM (Random Access Memory) is used for temporary storage of data and instructions that are currently being processed. CPU (Central Processing Unit) is the main component responsible for executing instructions and performing calculations. The motherboard is the main circuit board that connects all the components together and allows communication between them. These components are essential for the functioning of all three devices, regardless of their specific purpose or functionality.

    Rate this question:

  • 4. 

    Using six subnet bits, how many usable subnets are created?

    • 58

    • 60

    • 62

    • 66

    Correct Answer
    A. 62
    Explanation
    By using six subnet bits, we can create a total of 64 subnets. However, the first and last subnets are typically reserved for network and broadcast addresses respectively, leaving us with 62 usable subnets. Therefore, the correct answer is 62.

    Rate this question:

  • 5. 

    Which part of the IP address 172.17.128.47 does the subnet mask 255.255.0.0 tell the router to look for?

    • 172.17.128.47

    • 172.17.128

    • 172.17

    • 10.172.47

    Correct Answer
    A. 172.17
    Explanation
    The subnet mask 255.255.0.0 tells the router to look for the network portion of the IP address. In this case, the network portion is 172.17. So, the router will look for the network with the IP address 172.17.

    Rate this question:

  • 6. 

    Which Cisco IOS software command creates a message to be displayed upon logging into a router?

    • Hostname hostname

    • Banner motd message

    • Hostname interface description

    • Description interface description

    Correct Answer
    A. Banner motd message
    Explanation
    The correct answer is "banner motd message". This command is used to create a message of the day (MOTD) that will be displayed to users upon logging into a router. The "banner" command is used to create various types of banners, and "motd" specifies that it is a message of the day banner. The "message" parameter is used to specify the actual message that will be displayed.

    Rate this question:

  • 7. 

    If both enable secret and the enable password commans are configured on your router, how do you get the # prompt?

    • Enter the enable secret command

    • Enter the enable password command

    • Enter either enable secret or enable password commands

    • Enter both the enable secret and enable password commands

    Correct Answer
    A. Enter the enable secret command
    Explanation
    To get the # prompt when both the enable secret and enable password commands are configured on the router, you need to enter the enable secret command. The enable secret command is a more secure method of authentication compared to the enable password command. It uses a stronger encryption algorithm to protect the password. Therefore, when both commands are configured, the router will prioritize the enable secret command for authentication and grant access to the # prompt.

    Rate this question:

  • 8. 

    Which Cisco IOS software command configures a serial port in slot 0, port 1 on a modular router?

    • Interface serial 0-0-1

    • Interface serial 0 0 1

    • Interface serial 0/0/1

    • Interface serial 0/0-1

    Correct Answer
    A. Interface serial 0/0/1
    Explanation
    The correct answer is "interface serial 0/0/1". This command configures a serial port in slot 0, port 1 on a modular router. The format "0/0/1" represents the slot number, subslot number, and port number respectively.

    Rate this question:

  • 9. 

    Which of the following is a Cisco IOS tool that can be used for secure remote access to another device?

    • SSH

    • SDM

    • Ping

    • Telnet

    • Traceroute

    Correct Answer
    A. SSH
    Explanation
    SSH (Secure Shell) is a Cisco IOS tool that can be used for secure remote access to another device. It provides encrypted communication between the client and the server, ensuring that data transmitted over the network cannot be intercepted or tampered with by unauthorized individuals. Unlike telnet, which transmits data in plain text, SSH encrypts the data, making it a more secure option for remote access. SDM (Security Device Manager) is a web-based tool used for managing Cisco devices, while ping and traceroute are network troubleshooting tools.

    Rate this question:

  • 10. 

    Which statement most accurately describes static and dynamic routes?

    • Dynamic routes are manually configured by a network admin, whereas static routes are automatically learned and adjusted by a routing protocol

    • Static routes are manually configured by a network admin, whereas dynamic routes are automatically learned and adjusted by a routing protocol

    • Static routes tell the router how to forward packets to the networks that are not directly connected, whereas dynamic routes tell the router how to forward packets to networks that are directly connected

    • Dynamic routes tell the router how to forward packets to the networks that are not directly connected, whereas static routes tell the router how to forward packets to networks that are directly connected

    Correct Answer
    A. Static routes are manually configured by a network admin, whereas dynamic routes are automatically learned and adjusted by a routing protocol
    Explanation
    Static routes are routes that are manually configured by a network administrator. These routes are set up by specifying the destination network and the next hop or exit interface for the router to use when forwarding packets to that network. Static routes do not adjust or change automatically.

    Dynamic routes, on the other hand, are routes that are automatically learned and adjusted by a routing protocol. A routing protocol is a set of rules and algorithms that routers use to exchange information about the networks they are connected to. The routing protocol dynamically updates the routing table, which contains information about the best path to reach different networks.

    So, the correct statement is that static routes are manually configured by a network admin, whereas dynamic routes are automatically learned and adjusted by a routing protocol.

    Rate this question:

  • 11. 

    What stage of a Cisco router boot process verifies that all router components are operational?

    • POST

    • Find Cisco IOS Software

    • Find bootstrap

    • Find configuration

    Correct Answer
    A. POST
    Explanation
    POST stands for Power-On Self Test. It is the stage of the Cisco router boot process that verifies the functionality of all router components. During the POST stage, the router checks if all hardware components such as the CPU, memory, interfaces, and power supply are operational. This ensures that the router is in a suitable state to proceed with the boot process.

    Rate this question:

  • 12. 

    Which Cisco router component is used primarily to store the startup config file?

    • RAM

    • ROM

    • NVRAM

    • Flash memory

    • Configuration register

    Correct Answer
    A. NVRAM
    Explanation
    NVRAM, or Non-Volatile Random Access Memory, is the correct answer. NVRAM is a type of memory that retains its information even when the router is powered off. It is used primarily to store the startup configuration file, which contains the initial settings and configurations for the router. This allows the router to load the saved configuration upon startup, ensuring consistent settings each time it is powered on.

    Rate this question:

  • 13. 

    Given the system image file c2600-js-mz.122.21abin, which part of the name indicates the platform

    • C2600

    • Js

    • Mz

    • 122-21a

    Correct Answer
    A. C2600
    Explanation
    The part of the name "c2600" indicates the platform.

    Rate this question:

  • 14. 

    How many host addresses can be used in a Class C network

    • 253

    • 254

    • 255

    • 256

    Correct Answer
    A. 254
    Explanation
    A Class C network uses a 24-bit network mask, which allows for 256 possible addresses. However, two of these addresses are reserved for network identification and broadcast, leaving 254 host addresses that can be used for devices within the network.

    Rate this question:

  • 15. 

    All computers function using the?

    • Base-10 system

    • Decimal system

    • Numeric system

    • Binary system

    Correct Answer
    A. Binary system
    Explanation
    Computers function using the binary system, which is a numeric system that uses only two digits: 0 and 1. This system is used because computers are made up of electronic circuits that can be in one of two states, either on or off, represented by 1 and 0 respectively. These binary digits, also known as bits, are used to represent all types of data and instructions in a computer, allowing it to perform calculations, store and retrieve information, and execute programs. The binary system is fundamental to computer architecture and is the basis for all digital computing.

    Rate this question:

  • 16. 

    IP addresses are represented using?

    • 32-bit binary numbers

    • 16-bit decimal numbers

    • 8-bit binary numbers

    • Eight sets of 4-bit decimal numbers

    Correct Answer
    A. 32-bit binary numbers
    Explanation
    IP addresses are represented using 32-bit binary numbers. This means that an IP address consists of 32 binary digits, which are typically grouped into four octets (each octet containing 8 bits). This binary representation allows for a total of 2^32 (or approximately 4.3 billion) unique IP addresses to be assigned.

    Rate this question:

  • 17. 

    Which two of the following are functions of DHCP

    • DHCP dynamically assigns hostnames to client devices

    • DHCP dynamically assigns IP addresses to client devices

    • DHCP dynamically assigns a default gateway to client devices

    • DHCP dynamically assigns security access level to client devices

    Correct Answer(s)
    A. DHCP dynamically assigns IP addresses to client devices
    A. DHCP dynamically assigns a default gateway to client devices
    Explanation
    DHCP (Dynamic Host Configuration Protocol) is a network protocol that automatically assigns IP addresses and other network configuration settings to client devices. It allows client devices to obtain an IP address and other necessary information from a DHCP server. Therefore, the correct answers are "DHCP dynamically assigns IP addresses to client devices" and "DHCP dynamically assigns a default gateway to client devices".

    Rate this question:

  • 18. 

    At which OSI level do WAN protocols describe how to provide electrical, mechanical, operational, and functional connections to the services of a communications service provider?

    • Layer 1

    • Layer 2

    • Layer 3

    • Layer 4

    Correct Answer
    A. Layer 1
    Explanation
    WAN protocols describe how to provide electrical, mechanical, operational, and functional connections to the services of a communications service provider at Layer 1 of the OSI model. Layer 1, also known as the Physical layer, deals with the physical transmission of data over the network. It defines the physical characteristics of the network such as cables, connectors, and signaling. Therefore, it is responsible for describing the physical connections required for WAN protocols to connect to the services of a communications service provider.

    Rate this question:

  • 19. 

    Which of the following protocols is an example of an exterior gateway protocol?

    • RIP

    • BGP

    • IGRP

    • EIGRP

    Correct Answer
    A. BGP
    Explanation
    BGP (Border Gateway Protocol) is an example of an exterior gateway protocol. It is designed to exchange routing information between different autonomous systems (AS) on the internet. BGP is used by internet service providers (ISPs) to establish and maintain routing tables, allowing them to make informed decisions on the best paths for data to travel across different networks. Unlike interior gateway protocols (IGP) such as RIP, IGRP, and EIGRP, which are used within a single autonomous system, BGP is specifically designed for interconnecting multiple autonomous systems.

    Rate this question:

  • 20. 

    Which keyword do you add to the show cdp neighbors command to obtain additional information in the output

    • Full

    • Detail

    • Verbose

    • Complete

    Correct Answer
    A. Detail
    Explanation
    Adding the "detail" keyword to the "show cdp neighbors" command will provide additional information in the output. This additional information may include the device's capabilities, platform, and the port ID of the neighbor device.

    Rate this question:

  • 21. 

    Why must you be very careful when using debug commands?

    • They are destructive

    • They open up security holes

    • They prevent normal traffic processing

    • They can have a negative impact on performance

    Correct Answer
    A. They can have a negative impact on performance
    Explanation
    When using debug commands, it is important to be very careful because they can have a negative impact on performance. Debug commands are designed to provide detailed information about the system's processes and operations, but they can consume significant system resources and slow down the overall performance. Therefore, using debug commands without caution can result in system slowdowns, delays, and even crashes. It is crucial to use them sparingly and only when necessary to avoid any negative impact on the system's performance.

    Rate this question:

  • 22. 

    When a router receives a packet with a destination address that is within an unkown subnetwork of a directly attached network, what is the default behavior ip the ip classless command is not enabled?

    • Drop the packet

    • Forward the packet to the default route

    • Forward the packet to the next hop for the directly attached network

    • Broadcast the packet through all the interfaces except the one on which it was received

    Correct Answer
    A. Drop the packet
    Explanation
    If the "ip classless" command is not enabled, the default behavior when a router receives a packet with a destination address within an unknown subnetwork of a directly attached network is to drop the packet. This means that the router will not forward the packet to any other destination or broadcast it through any interfaces. Instead, it will simply discard the packet, effectively preventing it from reaching its intended destination.

    Rate this question:

  • 23. 

    What is the max number of bits that can be borrowed to create a subnet for a Class C network?

    • 2

    • 4

    • 6

    • 8

    Correct Answer
    A. 6
    Explanation
    The maximum number of bits that can be borrowed to create a subnet for a Class C network is 6. A Class C network has a default subnet mask of 255.255.255.0, which means that the first 24 bits are reserved for the network address and the last 8 bits are available for host addresses. By borrowing 6 bits from the host portion, we can create subnets with a subnet mask of 255.255.255.192, allowing for a maximum of 64 subnets.

    Rate this question:

  • 24. 

    Which two of the following are binary default subnet masks?

    • 11111111.00000000.00000000.00000000

    • 11111111.11111111.010000000.00000000

    • 11111111.11111111.11111111.000000000

    • 255.255.224.0

    Correct Answer(s)
    A. 11111111.00000000.00000000.00000000
    A. 11111111.11111111.11111111.000000000
    Explanation
    The two binary default subnet masks are 11111111.00000000.00000000.00000000 and 11111111.11111111.11111111.000000000. These subnet masks are binary representations of the decimal subnet masks 255.0.0.0 and 255.255.255.0 respectively. The first subnet mask has all 8 bits in the first octet set to 1, indicating that the network portion of the IP address is 8 bits long. The second subnet mask has all 8 bits in the first three octets set to 1, indicating that the network portion of the IP address is 24 bits long.

    Rate this question:

  • 25. 

    How should you power up a Cisco router?

    • Presst he reset button

    • Turn the power switch to on

    • Connect the fiber cable to another router

    • Attach the power cable plug to the router power supply socket

    Correct Answer
    A. Turn the power switch to on
    Explanation
    To power up a Cisco router, you should turn the power switch to the "on" position. This action will supply the necessary electrical power to the router and allow it to start functioning. Pressing the reset button is not the correct method for powering up the router, as it is mainly used for resetting the device to its default settings. Connecting the fiber cable to another router or attaching the power cable plug to the router power supply socket are also not the appropriate steps for powering up the Cisco router.

    Rate this question:

  • 26. 

    What would you use to suspend a Telnet session?

    • End keyword

    • Suspend keyword

    • Ctrl-Shift-6 key sequence

    • Ctrl-Shift-Del Key sequence

    Correct Answer
    A. Ctrl-Shift-6 key sequence
    Explanation
    To suspend a Telnet session, you would use the Ctrl-Shift-6 key sequence. This key combination allows you to temporarily suspend the Telnet session without closing it completely. This is useful when you need to switch to another task or access a different command prompt while keeping the Telnet session active in the background.

    Rate this question:

  • 27. 

    Which output for the show interface command indicates that PPP is configured properly?

    • Encaps = PPP

    • PPP encapsulation

    • Encapsulation PPP

    • Encapsulation HDLC using PPP

    Correct Answer
    A. Encapsulation PPP
    Explanation
    The output "Encapsulation PPP" indicates that PPP is configured properly. PPP (Point-to-Point Protocol) is a data link protocol used to establish a direct connection between two nodes. The "Encapsulation PPP" output suggests that the interface is configured to use PPP encapsulation, which is the correct configuration for establishing a PPP connection.

    Rate this question:

  • 28. 

    How does  a distance vector router learn about paths for networks that are not directly connected?

    • From the source router

    • From neighboring routers

    • From the destination router

    • Learns only about directly connected networks

    Correct Answer
    A. From neighboring routers
    Explanation
    A distance vector router learns about paths for networks that are not directly connected from neighboring routers. Distance vector routing protocols, such as Routing Information Protocol (RIP) and Interior Gateway Routing Protocol (IGRP), use a routing algorithm that determines the best path to a destination network based on the distance (or metric) and the direction (or vector) to that network. By exchanging routing information with neighboring routers, a distance vector router can learn about networks that are not directly connected and update its routing table accordingly.

    Rate this question:

  • 29. 

    What does a distance vector router send to its neighboring routers as apart of a periodic routing table update?

    • The entire routing table

    • Information about new routes

    • Information about routes that have changed

    • Information about routes that no longer exist

    Correct Answer
    A. The entire routing table
    Explanation
    A distance vector router sends the entire routing table to its neighboring routers as a part of a periodic routing table update. This allows the neighboring routers to have the most up-to-date information about all the available routes. By sending the entire routing table, the router ensures that any changes or updates in routes are communicated to its neighbors, enabling them to make informed routing decisions.

    Rate this question:

  • 30. 

    Which Cisco IOS command produces the same result as the show cdp neighbors detail command?

    • Show cdp traffic

    • Show cdp entry *

    • Show cdp neighbors

    • Show cdp interface all

    Correct Answer
    A. Show cdp entry *
    Explanation
    The correct answer is "show cdp entry *". This command will display detailed information about all CDP neighbors, just like the "show cdp neighbors detail" command. The wildcard (*) is used to include all entries.

    Rate this question:

  • 31. 

    What happens if the router cannot find a valid startup config file in NVRAM during router boot?

    • The router enters setup mode

    • The router attempts to restart

    • The router runs ROM monitor

    • The router performs a shutdown

    Correct Answer
    A. The router enters setup mode
    Explanation
    If the router cannot find a valid startup config file in NVRAM during boot, it will enter setup mode. In this mode, the router prompts the user to configure basic settings such as hostname, passwords, and IP addresses. This allows the user to manually set up the router's initial configuration.

    Rate this question:

  • 32. 

    Which bits of the configuration register value make up the boot field 

    • Lowest octet

    • Highest octet

    • Lowest four bits

    • Highest four btis

    Correct Answer
    A. Lowest four bits
    Explanation
    The boot field in the configuration register value is made up of the lowest four bits.

    Rate this question:

  • 33. 

    Which action can lead to a software reload on a Cisco device?

    • Disabling a debug privileged EXEC command on a heavily used production router

    • Enabling a debug privileged EXEC command on a heavily used production router

    • Enabling a debug privileged EXEC command on a lightly used production router

    • Disabling a debug privileged EXEC command on a lightly used production router

    Correct Answer
    A. Enabling a debug privileged EXEC command on a heavily used production router
    Explanation
    Enabling a debug privileged EXEC command on a heavily used production router can lead to a software reload on a Cisco device. Debug commands are used for troubleshooting purposes and can generate a large amount of output, which can consume system resources and cause the router to become unresponsive. In a heavily used production environment, where the router is already under high load, enabling a debug command can push the device beyond its capacity and result in a software reload.

    Rate this question:

  • 34. 

    What is that max allowable hop count for RIP

    • 6

    • 15

    • 30

    • 60

    Correct Answer
    A. 15
    Explanation
    The maximum allowable hop count for RIP (Routing Information Protocol) is 15. This means that RIP will only consider routes that are within 15 hops away from the source. If a route exceeds this hop count, it will be considered unreachable. RIP uses hop count as a metric to determine the best path for routing packets in a network. By limiting the hop count to 15, RIP ensures that the network topology remains relatively small and prevents routing loops or excessive delays in packet delivery.

    Rate this question:

  • 35. 

    Where is the runnign configuration of the router usually stored?

    • BIOS

    • RAM

    • NVRAM

    • Bootflash

    Correct Answer
    A. RAM
    Explanation
    The running configuration of a router is usually stored in RAM. RAM, or Random Access Memory, is a volatile memory that is used to store data that is actively being used by the router. The running configuration includes the current settings and parameters of the router, such as interface configurations, routing protocols, and security settings. Storing the running configuration in RAM allows for quick access and modification of the router's settings. However, it is important to note that the running configuration is lost if the router is restarted or powered off.

    Rate this question:

  • 36. 

    On a heavily used production router, enabling a debug privileged EXEC command can be blank

    • Useful

    • Helpful

    • Harmful

    • Difficult

    Correct Answer
    A. Harmful
    Explanation
    Enabling a debug privileged EXEC command on a heavily used production router can be harmful. Debug commands generate a significant amount of output, which can consume valuable system resources and impact the router's performance. This can lead to network slowdowns, dropped packets, and even router crashes. Debug commands should only be used in controlled environments or during troubleshooting, as they can disrupt normal network operations and cause unintended consequences.

    Rate this question:

  • 37. 

    Which two types of ports do routers have?

    • Printer

    • Console

    • Network

    • CD-ROM

    • USB

    Correct Answer(s)
    A. Console
    A. Network
    Explanation
    Routers have two types of ports: console and network. The console port is used for connecting to the router for configuration and management purposes. It allows administrators to access the router's command-line interface (CLI) and make changes to its settings. The network ports, on the other hand, are used for connecting the router to other devices in the network. These ports enable the router to send and receive data packets, allowing it to route traffic between different networks.

    Rate this question:

  • 38. 

    Which two statements best decribe the functions of a router in a network

    • Routers maintain their routing tables and ensure that other routers know of changes in the network

    • Routers use the routing table to determine where to forward packets

    • Routers strengthen the signal over large distances in a network

    • Routers create larger collision domains

    • Routers use ICMP to communicate network information from their own routing table with other routers

    Correct Answer(s)
    A. Routers maintain their routing tables and ensure that other routers know of changes in the network
    A. Routers use the routing table to determine where to forward packets
    Explanation
    Routers maintain their routing tables and ensure that other routers know of changes in the network. This means that routers keep track of the available paths in a network and update their routing tables accordingly. They also communicate these changes to other routers so that they are aware of the updated network topology.

    Routers use the routing table to determine where to forward packets. The routing table contains information about the available paths and their associated costs. When a router receives a packet, it looks at the destination address and checks its routing table to determine the best path to forward the packet towards its destination. By using the routing table, routers can efficiently route packets through the network.

    Rate this question:

  • 39. 

    Which one of the following containst routing information that helps a router determine the routing path?

    • IP address

    • MAC address

    • Routing table

    • Routing protocol

    Correct Answer
    A. Routing table
    Explanation
    A routing table contains routing information that helps a router determine the routing path. It is a database that is stored in a router and contains a list of available routes to different network destinations. The routing table includes information such as the destination network address, the next hop router, and the metric or cost associated with each route. By referencing the routing table, a router can determine the most appropriate path to send data packets to their intended destination.

    Rate this question:

  • 40. 

    If a router does not match the appropriate address portions to a number on its routing table, it?

    • Sends the packet back to the sender

    • Passes the packet to the next router in the hierarchy

    • Adds that number to its table

    • Discards the packet

    Correct Answer
    A. Discards the packet
    Explanation
    When a router does not find a match for the appropriate address portions in its routing table, it discards the packet. This means that the router does not have any information on how to forward the packet to its intended destination. Discarding the packet ensures that it does not continue to be passed along the network, preventing unnecessary network congestion.

    Rate this question:

  • 41. 

    Which statement best describes what the user EXEC mode command allows you to configure on a Cisco router?

    • You cannot configure anything; the user mode commands are used to display information

    • The user EXEC mode allows you to perform lgobal config tasks that affect the entire router

    • The user EXEC mode commands allow you to enter a secret password so that you can configure the router

    • The user EXEC mode commands allow you to configure interfaces, subinterfaces, lines, and routers

    Correct Answer
    A. You cannot configure anything; the user mode commands are used to display information
    Explanation
    The correct answer states that the user EXEC mode commands do not allow the user to configure anything on a Cisco router. Instead, these commands are used solely to display information.

    Rate this question:

  • 42. 

    When configuring NAT, the internet interface would be considered which of he following? 

    • NAT local interface

    • NAT inside interface

    • NAT global interface

    • NAT outside interface

    Correct Answer
    A. NAT outside interface
    Explanation
    The internet interface in NAT is considered the "NAT outside interface." This interface connects the local network to the internet and is responsible for translating the private IP addresses of the local network to a public IP address that can be used on the internet. The NAT outside interface is typically connected to the router or firewall that connects the local network to the internet.

    Rate this question:

  • 43. 

    What does the ppp authentication chap pap command configure?

    • Chap authentication will always be used

    • Either CHAP or PAP will be used, selected at random for security

    • CHAP authentication will be used unless the remote router requests PAP

    • If authentication fails using CHAP, then PAP authentication is attempted

    Correct Answer
    A. If authentication fails using CHAP, then PAP authentication is attempted
    Explanation
    The correct answer states that if authentication fails using CHAP, then PAP authentication is attempted. This means that the ppp authentication chap pap command configures the router to first try CHAP authentication. If the authentication fails, it will then attempt PAP authentication as a backup method.

    Rate this question:

  • 44. 

    Which command correctly specifies RIP as the routing protocol?

    • Router(config)#rip

    • Router(config)#router rip

    • Router(config-router)#rip

    • Router(config-router)#router rip

    Correct Answer
    A. Router(config)#router rip
    Explanation
    The correct answer is "Router(config)#router rip" because this command is used to enter the routing protocol configuration mode for RIP (Routing Information Protocol). By using this command, the router is configured to use RIP as the routing protocol.

    Rate this question:

  • 45. 

    Which command displays the CDP packet checksum errors?

    • Show cdp entry

    • Show cdp traffic

    • Show cdp interface

    • Show cdp neighbors

    Correct Answer
    A. Show cdp traffic
    Explanation
    The command "show cdp traffic" displays information about the CDP (Cisco Discovery Protocol) traffic on a Cisco device. This includes the number of CDP packets received and transmitted, as well as any checksum errors encountered. Therefore, this command can be used to view the CDP packet checksum errors.

    Rate this question:

  • 46. 

    The command show startup-config displays the onfiguration in which location?

    • ROM

    • RAM

    • NVRAM

    • Flash memory

    Correct Answer
    A. NVRAM
    Explanation
    The command "show startup-config" displays the configuration stored in NVRAM. NVRAM stands for Non-Volatile Random Access Memory, which is a type of memory that retains its data even when the power is turned off. The startup-config file contains the configuration settings that are used when the device is powered on or restarted. By using the "show startup-config" command, the user can view and verify the configuration stored in NVRAM.

    Rate this question:

  • 47. 

    Which Cisco IOS command is used to DL a copy of the Cisco IOS image file from a TFTP server

    • Cope IOS tftp:

    • Copy tftp: flash:

    • Copy flash: tftp:

    • Backup flash: tftp:

    Correct Answer
    A. Copy tftp: flash:
    Explanation
    The correct answer is "copy tftp: flash:". This command is used to download a copy of the Cisco IOS image file from a TFTP server to the flash memory of a Cisco device. The "copy" command is used to copy files, and in this case, "tftp:" specifies the source file location (TFTP server) and "flash:" specifies the destination file location (flash memory).

    Rate this question:

  • 48. 

    Which Cisco IOS command enables a Telnet session to receive console messages

    • Terminal monitor

    • Terminal debug monitor

    • Terminal debug messages

    • Terminal console messages

    Correct Answer
    A. Terminal monitor
    Explanation
    The Cisco IOS command "terminal monitor" enables a Telnet session to receive console messages. This means that when this command is used, any console messages that are generated on the device will be displayed on the Telnet session. This is useful for troubleshooting and monitoring purposes as it allows the user to see important system messages without having physical access to the device's console.

    Rate this question:

  • 49. 

    It is preferable to use debug commands during periods of blank network traffic and blank users

    • Lower, more

    • Lower, fewer

    • Higher, more

    • Higher, fewer

    Correct Answer
    A. Lower, fewer
    Explanation
    During periods of blank network traffic and blank users, it is preferable to use debug commands with lower intensity and fewer executions. This is because debug commands can generate a significant amount of output, which can overload the network and impact its performance. By using lower intensity and fewer executions of debug commands, the impact on network traffic and users is minimized, allowing for smoother operations.

    Rate this question:

Quiz Review Timeline (Updated): Jul 13, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Jul 13, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 08, 2012
    Quiz Created by
    Msmith721
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.