11.5.3 Build a Small Cisco Network Quiz Answers

Networking Devices and Initial Configuration Module 11.5.3 Build a Small Cisco Network Quiz Answers

1. A user can print to a printer that is on the same network, but the traffic of the user cannot reach the internet. What is a possible cause of the problem?

  • The PC default gateway address is missing or incorrect.
  • The PC has an incorrect IP address.
  • The network cable connected to the user PC is faulty.
  • The NIC on the PC is faulty.

Explanation: The default gateway IP address is used to reach other networks, including the Internet.

2. Which connection provides a secure CLI session with encryption to a Cisco switch?

  • a console connection
  • an AUX connection
  • a Telnet connection
  • an SSH connection

Explanation: A CLI session using Secure Shell (SSH) provides enhanced security because SSH supports strong passwords and encryption during the transport of session data. The other methods support authentication but not encryption.

3. On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

  • FastEthernet0/1
  • VLAN 1
  • vty 0
  • console 0

Explanation: Interface VLAN 1 is a virtual interface on a switch, called SVI (switch virtual interface). Configuring an IP address on the default SVI, interface VLAN 1, will allow a switch to be accessed remotely. The VTY line must also be configured to allow remote access, but an IP address cannot be configured on this line.

4. An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

  • Configure the IP domain name on the router.
  • Enable inbound vty Telnet sessions.
  • Generate the SSH keys.
  • Configure DNS on the router.
  • Enable inbound vty SSH sessions.
  • Generate two-way pre-shared keys.

Explanation: There are four steps to configure SSH support on a Cisco router:
Step 1: Set the domain name.
Step 2: Generate one-way secret keys.
Step 3: Create a local username and password.
Step 4: Enable SSH inbound on a vty line.

5. Match the commands to the correct actions.

Explanation: Place the options in the following order:

configures a name on the router hostname
provides security on the console password class
displays a message after accessing the router banner motd

6. A technician is configuring a router to allow for all forms of management access. As part of each different type of access, the technician is trying to type the command login. Which configuration mode should be entered to do this task?

  • user executive mode
  • global configuration mode
  • any line configuration mode
  • privileged EXEC mode

Explanation: The command login is used to allow access to a router or switch through aux lines, console lines, and Telnet lines.

7. Which statement describes SVIs?

  • An SVI is created automatically for each VLAN on a multilayer switch.
  • Creating an SVI automatically creates an associated VLAN.
  • A default SVI is created for VLAN 1 for switch administration.
  • An SVI can only be created for the management purposes.

Explanation: To allow for remote switch administration, an SVI is created by default for VLAN 1.

8. What is one difference between using Telnet or SSH to connect to a network device for management purposes?

  • Telnet uses UDP as the transport protocol whereas SSH uses TCP.
  • Telnet does not provide authentication whereas SSH provides authentication.
  • Telnet supports a host GUI whereas SSH only supports a host CLI.
  • Telnet sends a username and password in plain text, whereas SSH encrypts the username and password.

Explanation: SSH provides security for remote management connections to a network device. SSH does so through encryption for session authentication (username and password) as well as for data transmission. Telnet sends a username and password in plain text, which can be targeted to obtain the username and password through data capture. Both Telnet and SSH use TCP, support authentication, and connect to hosts in CLI.

9. Which type of access is secured on a Cisco router or switch with the enable secret command?

  • virtual terminal
  • privileged EXEC
  • AUX port
  • console line

Explanation: The enable secret command secures access to the privileged EXEC mode of a Cisco router or switch.

10. Which statement regarding the service password-encryption command is true?

  • It is configured in privileged EXEC mode.
  • It encrypts only line mode passwords.
  • As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted.
  • To see the passwords encrypted by the service password-encryption command in plain text, issue the no service password-encryption command.

Explanation: The command service password-encryption is used to encrypt all the clear text passwords in the running-configuration file.

11. What happens when the transport input ssh command is entered on the switch vty lines?

  • The SSH client on the switch is enabled.
  • Communication between the switch and remote users is encrypted.
  • The switch requires a username/password combination for remote access.
  • The switch requires remote connections via a proprietary client software.

Explanation: The transport input ssh command when entered on the switch vty (virtual terminal lines) will encrypt all inbound controlled telnet connections.

Notify of

Inline Feedbacks
View all comments