ICND Part 1 Vol 1 Module 2 Review

Reviewed by Editorial Team
The ProProfs editorial team is comprised of experienced subject matter experts. They've collectively created over 10,000 quizzes and lessons, serving over 100 million users. Our team includes in-house content moderators and subject matter experts, as well as a global network of rigorously trained contributors. All adhere to our comprehensive editorial guidelines, ensuring the delivery of high-quality content.
Learn about Our Editorial Process
| By Whithickson
W
Whithickson
Community Contributor
Quizzes Created: 1 | Total Attempts: 255
| Attempts: 255 | Questions: 38
Please wait...
Question 1 / 38
0 %
0/100
Score 0/100
1. Which command would you enter in the privileged EXEC mode to list the command options? (Source: Operating Cisco IOS Software)

Explanation

In the privileged EXEC mode, entering the "?" command will list the available command options. This command is used to get help and display a list of available commands and their descriptions. It is a useful tool for navigating and using the Cisco IOS software effectively.

Submit
Please wait...
About This Quiz
ICND Quizzes & Trivia

This module reviews key concepts related to Ethernet LANs, addressing challenges like collisions and congestion, and introduces devices like hubs, bridges, and their functions in network management.

2. Which Cisco IOS command correctly configures an IP address and subnet mask on a switch? (Source: Starting a Switch)

Explanation

The correct answer is "ip address 196.125.243.10 255.255.255.0". This command is used to configure an IP address and subnet mask on a switch. The IP address "196.125.243.10" and the subnet mask "255.255.255.0" are specified in the command, allowing the switch to be assigned a unique IP address within the network and defining the range of IP addresses that are considered local to the switch.

Submit
3. How do you instruct a Cisco device to parse and execute an entered command? (Source: Operating Cisco IOS Software)

Explanation

To instruct a Cisco device to parse and execute an entered command, you need to press the Enter key. This is the standard method used to send the command to the device for processing.

Submit
4. Which CLI prompt indicates that you are working in privileged EXEC mode? (Source: Operating Cisco IOS Software)

Explanation

The CLI prompt "hostname#" indicates that you are working in privileged EXEC mode. In this mode, you have access to all the commands and features of the Cisco IOS software and can make configuration changes to the device. The "#" symbol at the end of the prompt is the indicator that you are in privileged mode.

Submit
5. Which of the following is the most secure method of remotely accessing a network device? (Source: Switch Security)

Explanation

SSH (Secure Shell) is the most secure method of remotely accessing a network device. Unlike HTTP and Telnet, which transmit data in plain text, SSH encrypts all data, including passwords and commands, providing confidentiality and protection against eavesdropping. RMON (Remote Monitoring) and SNMP (Simple Network Management Protocol) are network monitoring protocols and do not provide secure remote access like SSH does. Therefore, SSH is the best choice for securely accessing a network device remotely.

Submit
6. When you use the show interface command to display the status and statistics for the interfaces configured on a Catalyst switch, which output field indicates the MAC address that identifies the interface hardware? (Source: Starting a Switch)

Explanation

The output field "Address is 0050.BD73.E2Cl" indicates the MAC address that identifies the interface hardware.

Submit
7. What type of hardware will help eliminate collisions? (Source: Solving Network Challenges with Switched LAN Technology)

Explanation

not-available-via-ai

Submit
8. Upon initial installation of a Cisco switch or router, the network administratOr typically configures the networking devices from a -. (Source: Operating Cisco IOS Software)

Explanation

not-available-via-ai

Submit
9. Which statement best describes how loops can affect performance in a switched LAN? (Source: Maximizing the Benefits of Switching)

Explanation

Loops in a switched LAN can lead to the creation of broadcast storms, which can have a negative impact on network performance. Broadcast storms occur when a broadcast message is continuously forwarded and replicated by switches, causing excessive network traffic and congestion. This prevents other data from being transmitted effectively over the network, leading to performance issues. Therefore, the statement "Broadcast storms may be created when loops occur, preventing data from being transmitted over the network" accurately describes how loops can affect performance in a switched LAN.

Submit
10. Which configuration mode will you use to configure a particular port on a switch? (Source: Starting a Switch)

Explanation

To configure a particular port on a switch, you would use the "interface configuration mode." This mode allows you to make changes and customize settings specifically for a particular interface or port on the switch. In this mode, you can configure parameters such as speed, duplex, VLAN membership, and security settings for the specific port you are working with.

Submit
11. If the POST tests complete successfully on a Catalyst switch, what display could you see on the console? (Source: Starting a Switch)

Explanation

not-available-via-ai

Submit
12. Which three statements are accurate about how the network performance of a switch compares to that of a bridge? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)

Explanation

not-available-via-ai

Submit
13. Which problem is caused by redundant connections in a network? (Source: Maximizing the Benefits of Switching)

Explanation

Redundant connections in a network can cause loops. Loops occur when there are multiple paths between network devices, leading to packets being continuously forwarded in a loop without reaching their intended destination. This can result in network congestion, increased latency, and even network failures. Therefore, loops caused by redundant connections are a problem in a network.

Submit
14. Which statement accurately describes Spanning-Tree Protocol? (Source: Maximizing  Benefits of Switching)  

Explanation

Spanning-Tree Protocol (STP) assigns roles to bridges and ports to ensure that only one forwarding path exists through the network at any given time. This means that STP prevents loops and ensures that there is a single active path for data transmission. By designating one bridge as the root bridge and determining the shortest path to reach it, STP eliminates redundant paths and avoids network congestion. It achieves this by blocking certain ports, effectively keeping previously inactive paths inactive. This ensures a stable and efficient network topology.

Submit
15. What CLI command should you enter to display a list of commands that begin with the letter "C" on a Catalyst switch? (Source: Starting a Switch)

Explanation

To display a list of commands that begin with the letter "C" on a Catalyst switch, you should enter the command "c?". This command will provide a list of available commands that start with "C". It is a common convention in CLI (Command Line Interface) to use the "?" symbol as a wildcard to display a list of available options or commands.

Submit
16. If a network administrator is supporting a remote device, the preferred method is to use a modem connection to the - of the device for remote configuration. (Source: Operating Cisco IOS Software)

Explanation

The auxiliary port is the preferred method for remote configuration of a remote device when a network administrator is supporting it. This port allows the administrator to establish a modem connection to the device, enabling remote access and configuration. The console port is typically used for local configuration, while the LAN and uplink ports are used for network connectivity. Therefore, the auxiliary port is the correct choice for remote configuration.

Submit
17. Which of the following is a Cisco IOS command that is the most useful when troubleshooting media issues? (Source: Troubleshooting Switch Issues)

Explanation

The command "show interface" is the most useful when troubleshooting media issues because it provides detailed information about the interfaces on a Cisco device. This command displays the status, configuration, and statistics of the interfaces, allowing the user to identify any issues related to media connectivity. By examining the output of this command, network administrators can determine if there are any errors, collisions, or other problems with the media, helping them diagnose and resolve media-related issues effectively.

Submit
18. How should you power up a Cisco router? (Source: Starting a Switch)

Explanation

To power up a Cisco router, you should turn the power switch to "on." This will provide the necessary electrical power to the router, allowing it to start functioning. Pressing the Reset button is not the correct method for powering up the router as it is primarily used for resetting the device to its default settings. Connecting the fiber cable to another router is not related to powering up the router, and attaching the power cable plug to the router power supply socket is a step that follows after turning the power switch on.

Submit
19. Which of two the following would be considered a physical threat? (Choose two.) (Source: Switch Security)

Explanation

The two options that would be considered physical threats are someone turning off the power to the switch to block network access and someone turning off the air conditioning system in the network closet. Both of these actions can directly impact the functionality and availability of the network and its components. Leaving a password in a desk and breaking into the cabinet containing network documentation are security risks, but they do not fall under the category of physical threats.

Submit
20. Which show command requires that you have privileged EXEC mode access? (Source: Starting a Switch)

Explanation

The show running command requires privileged EXEC mode access. This command displays the current running configuration of the device, including all the current settings and parameters. Privileged EXEC mode access is required because the running configuration contains sensitive information about the device's operation and settings, and only authorized users should have access to it.

Submit
21. Which of the following is customized text that is displayed before the usemame and password login prompts? (Source: Switch Security)

Explanation

A login banner is customized text that is displayed before the username and password login prompts. It is typically used to provide important information or warnings to users before they log in to a system.

Submit
22. Which of the following is a Cisco IOS command that can be used to increase the security of unused switch ports? (Source: Switch Security)

Explanation

The correct answer is "shutdown." By using the "shutdown" command, the administrator can disable unused switch ports, effectively preventing unauthorized access or potential security breaches. This command ensures that only authorized devices can connect to active switch ports, thereby increasing the overall security of the network.

Submit
23. Which of the following is a Cisco IOS command that is the most useful when troubleshooting port access issues? (Source: Troubleshooting Switch Issues)

Explanation

The "show interface" command is the most useful when troubleshooting port access issues. This command provides detailed information about the interface, including its status, configuration, and statistics. By using this command, network administrators can quickly identify any errors, collisions, or other issues that may be affecting port access. It also provides information about the interface's current operational state, such as its speed, duplex mode, and VLAN membership. Therefore, the "show interface" command is essential for diagnosing and resolving port access problems.

Submit
24. What CLI command should you enter to display the command syntax help so that you can see how to complete a command that begins with config? (Source: Starting a Switch)

Explanation

not-available-via-ai

Submit
25. Which three statements about microsegmentation are accurate? (Choose three.) (Source: Maximizing the Benefits of Switching)

Explanation

not-available-via-ai

Submit
26. Which of the following is a Cisco IOS feature that can be used to control access to the vty ports? (Source: Switch Security)

Explanation

Access-list is a Cisco IOS feature that can be used to control access to the vty ports. Access-lists are used to filter traffic based on specific criteria such as source and destination IP addresses, protocols, and port numbers. By configuring an access-list on the vty ports, administrators can restrict or allow access to the device based on defined rules. This helps in enhancing the security of the network infrastructure by preventing unauthorized access to the vty ports.

Submit
27. Which three factors are typical causes of network congestion? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)

Explanation

not-available-via-ai

Submit
28. Which three of the following are methods used to mitigate configuration issues? (Choose three.) (Source: Troubleshooting Switch Issues)

Explanation

The three methods used to mitigate configuration issues are:
1. Secure the configuration: This involves implementing security measures such as password protection, encryption, and access control lists to prevent unauthorized access and changes to the configuration settings.
2. Verify changes before you save: This involves testing and validating any configuration changes before saving them to ensure they do not cause any issues or disruptions in the network.
3. Know what you have before you start: This refers to having a clear understanding of the existing network configuration and documentation before making any changes, to avoid any unintended consequences or conflicts.

Submit
29. Which three statements best describe collisions? (Choose three.) (Source: Understanding the Challenges of Shared LANs)

Explanation

Answer key is wrong in book. See p 2-7 bottom of page.

Submit
30. Which of these choices best describes a collision domain? (Source: Understanding the Challenges of Shared LANs)

Explanation

not-available-via-ai

Submit
31. How do you start a Catalyst 2950 series switch? (Source: Starting a Switch)

Explanation

not-available-via-ai

Submit
32. Which three features differentiate switches from bridges? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)

Explanation

not-available-via-ai

Submit
33. Which four of the following can be protected with a password? (Choose four.) (Source: Switch Security)

Explanation

I believe book is wrong again, it lists TTY. But see page 2-79 bottom of page. lists user login. same as router

Submit
34. Which three characteristics apply to a switch? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)

Explanation

not-available-via-ai

Submit
35. Which of the following is a Cisco IOS command that can be used to control access to a switch port based upon a MAC address? (Source: Switch Security)

Explanation

The correct answer is "mac-secure." This command is used in Cisco IOS to control access to a switch port based on a MAC address. It allows the network administrator to specify which MAC addresses are allowed or denied access to the port, enhancing security by preventing unauthorized devices from connecting to the network.

Submit
36. Which two statements about the functions of a hub are accurate? (Choose two.) (Source: Understanding the Challenges of Shared LANs)

Explanation

A hub extends an Ethernet LAN by connecting multiple devices together, allowing them to communicate with each other. A hub is a data link layer device, as it operates at the physical layer of the OSI model, receiving and transmitting data packets between devices on the network.

Submit
37. What are two major benefits of adding a bridge to a network? (Choose two.) (Source: Solving Network Challenges with Switched LAN Technology)

Explanation

not-available-via-ai

Submit
38. What are three characteristics of a bridge? (Choose three.) (Source: Solving Network Challenges with Switched LAN Technology)

Explanation

not-available-via-ai

Submit
View My Results

Quiz Review Timeline (Updated): Mar 22, 2023 +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Mar 22, 2023
    Quiz Edited by
    ProProfs Editorial Team
  • Feb 10, 2009
    Quiz Created by
    Whithickson
Cancel
  • All
    All (38)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Which command would you enter in the privileged EXEC mode to list the...
Which Cisco IOS command correctly configures an IP address and subnet...
How do you instruct a Cisco device to parse and execute an entered...
Which CLI prompt indicates that you are working in privileged EXEC...
Which of the following is the most secure method of remotely accessing...
When you use the show interface command to display the status and...
What type of hardware will help eliminate collisions? (Source: Solving...
Upon initial installation of a Cisco switch or router, the network...
Which statement best describes how loops can affect performance in a...
Which configuration mode will you use to configure a particular port...
If the POST tests complete successfully on a Catalyst switch, what...
Which three statements are accurate about how the network performance...
Which problem is caused by redundant connections in a network?...
Which statement accurately describes Spanning-Tree Protocol? (Source:...
What CLI command should you enter to display a list of commands that...
If a network administrator is supporting a remote device, the...
Which of the following is a Cisco IOS command that is the most useful...
How should you power up a Cisco router? (Source: Starting a Switch)
Which of two the following would be considered a physical threat?...
Which show command requires that you have privileged EXEC mode access?...
Which of the following is customized text that is displayed before the...
Which of the following is a Cisco IOS command that can be used to...
Which of the following is a Cisco IOS command that is the most useful...
What CLI command should you enter to display the command syntax help...
Which three statements about microsegmentation are accurate? (Choose...
Which of the following is a Cisco IOS feature that can be used to...
Which three factors are typical causes of network congestion? (Choose...
Which three of the following are methods used to mitigate...
Which three statements best describe collisions? (Choose three.)...
Which of these choices best describes a collision domain? (Source:...
How do you start a Catalyst 2950 series switch? (Source: Starting a...
Which three features differentiate switches from bridges? (Choose...
Which four of the following can be protected with a password? (Choose...
Which three characteristics apply to a switch? (Choose three.)...
Which of the following is a Cisco IOS command that can be used to...
Which two statements about the functions of a hub are accurate?...
What are two major benefits of adding a bridge to a network? (Choose...
What are three characteristics of a bridge? (Choose three.) (Source:...
Alert!

Advertisement