CCNA 2 v6 Chapter 10: Check Your Understanding Questions Answers

CCNA 2 v6.0 (Routing & Switching Essentials v6) Chapter 10: Device Discovery, Management, and Maintenance: Check Your Understanding Questions Answers

1. What is a difference between CDP and LLDP?

  • CDP can gather information from routers, switches, and wireless APs, whereas LLDP can only gather information from routers and switches.
  • CDP can obtain both Layer 2 and Layer 3 information, whereas LLDP can only obtain Layer 2 information.
  • CDP is a proprietary protocol, whereas LLDP is a vendor-neutral protocol.
  • CDP is enabled on an interface using two commands, whereas LLDP requires only one command.

Explanation: CDP only operates on Cisco IOS devices. LLDP is an open standard, defined in IEEE 802.1AB, to support non-Cisco devices and to allow for interoperability between other devices.

2. A network administrator wants to configure a router so that only a specific interface will send and receive CDP information. Which two configuration steps accomplish this? (Choose two.)

  • R1(config)# no cdp enable
  • R1(config)# no cdp run
  • R1(config-if)# cdp enable
  • R1(config-if)# cdp run
  • R1(config-if)# cdp receive
  • R1(config-if)# cdp transmit

Explanation: The no cdp enable command interface configuration command cannot be executed from a global configuration prompt. Options D and E are invalid commands.

3. What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?

  • The capabilities of the neighbor
  • The hostname of the neighbor
  • The IP address of the neighbor
  • The platform that is used by the neighbor

Explanation: Both commands provide information for options A, B, and D. However, only show cdp neighbors detail provides the IP address.

4. What is the configuration command to globally enable LLDP on a Cisco Catalyst switch?

  • enable lldp
  • feature lldp
  • lldp enable
  • lldp run

Explanation: Options A through C are invalid commands. The option to enable LLDP on interfaces is lldp transmit and lldp receive.

5. Which option correctly enables LLDP on an interface?

  • R1(config-if)# lldp enable
  • R1(config-if)# lldp enable
    R1(config-if)# lldp receive
  • R1(config-if)# lldp receive
    R1(config-if)# lldp transmit
  • R1(config-if)# lldp enable
    R1(config-if)# lldp receive
    R1(config-if)# lldp transmit

Explanation: The option to enable LLDP on interfaces is lldp transmit and lldp receive.

6. What are the most common syslog messages?

  • Error messages about hardware or software malfunctions
  • Link up and link down messages
  • Output messages that are generated from debug output
  • Those that occur when a packet matches a parameter condition in an access control list

Explanation: These are all syslog messages, but the most common are link up and link down messages.

7. When logging is used, which severity level indicates that a device is unusable?

  • Level 0—Emergency
  • Level 1—Alert
  • Level 2—Critical
  • Level 3—Error

Explanation: The smaller the level numbers, the more critical the alarms. Emergency —Level 0 messages indicate that the system is unusable. This would be an event that has halted the system. Alert—Level 1 messages indicate that immediate action is needed, such as a failed connection to the ISP. Critical—Level 2 messages indicate a critical condition. An example would be the failure of a backup connection to the ISP. Error—Level 3 messages indicate an error condition, such as an interface that is down.

8. Which protocol or service allows network administrators to receive system messages that are provided by network devices?

  • NTP
  • NetFlow
  • SNMP
  • Syslog

Explanation: Syslog is used to access and store system messages. Cisco developed NetFlow for the purpose of gathering statistics on packets flowing through Cisco routers and multilayer switches. SNMP can be used to collect and store information about a device. NTP is used to allow network devices to synchronize time settings.

9. Which syslog message type is accessible only to an administrator via the Cisco CLI?

  • Alerts
  • Debugging
  • Emergency
  • Errors

Explanation: Syslog messages can be sent to the logging buffer, the console line, the terminal line, or a syslog server. However, debug-level messages are only forwarded to the internal buffer and only accessible through the Cisco CLI.

10. Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?

  • RAM
  • NVRAM
  • Nearest syslog server
  • Console

Explanation: Syslog messages for Cisco routers and switches can be sent to memory, the console, a tty line, or a syslog server.

11. A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command?

  • The syslog client sends to the syslog server any event message that has a severity level of 4 and lower.
  • The syslog client sends to the syslog server event messages with an identification trap level of only 4.
  • The syslog client sends to the syslog server any event message that has a severity level of 4 and higher.
  • After four events, the syslog client sends an event message to the syslog server.

Explanation: The logging trap level allows a network administrator to limit event messages that are being sent to a syslog server based on severity.

12. The command ntp server 10.1.1.1 is issued on router R1. What impact does this command have?

  • Identifies the NTP server that R1 will use to send system log messages to
  • Identifies the NTP server that R1 will use to store backup configurations
  • Identifies R1 as the NTP server using IP address 10.1.1.1
  • Synchronizes the clock of R1 with the timeserver at IP address 10.1.1.1

Explanation: Option A is for syslog, B is for TFTP, and the explanation for C is incorrect.

13. Which two statements are true about NTP servers in an enterprise network? (Choose two.)

  • All NTP servers synchronize directly to a stratum 1 time source.
  • NTP servers at stratum 1 are directly connected to an authoritative time source.
  • NTP servers control the mean time between failures (MTBF) for key network devices.
  • NTP servers ensure an accurate time stamp on logging and debugging information.
  • There can be only one NTP server on an enterprise network.

Explanation: A is incorrect. NTP have nothing to do with MTBF, and multiple NTP servers can be identified for redundancy.

14. What can a network administrator do to access a router if the password has been lost?

  • Access the router remotely through Telnet, and use the show running-config command.
  • Boot the router into ROMMON mode and reinstall the IOS from a TFTP server.
  • From ROMMON mode, configure the router to ignore the startup configuration when the router initializes.
  • Reboot the router and use the break key sequence to bypass the password during IOS bootup.

Explanation: The logging trap level allows a network administrator to limit event messages that are being sent to a syslog server based on severity.

15. An administrator issues the command confreg 0x2142 at the rommon 1> prompt. What is the effect when this router is rebooted?

  • Contents in NVRAM will be erased.
  • Contents in NVRAM will be ignored.
  • Contents in RAM will be erased.
  • Contents in RAM will be ignored.

16. A network technician is attempting a password recovery on a router. From ROMMON mode, which command must be entered to bypass the startup configuration file?

  • rommon> config-register 0x2102
  • rommon> confreg 0x2102
  • rommon> config-register 0x2142
  • rommon> confreg 0x2142

Explanation: Options A and C are global configuration commands, whereas Option B restores it to its default and looks for the configuration file.

17. What must an administrator have in order to reset a lost password on a router?

  • A crossover cable
  • A TFTP server
  • Access to another router
  • Physical access to the router

Explanation: Physical access to the device along with a console connection is required to perform password recovery.

18. In the IOS image named c1900-universalk9-mz.SPA.152-3.T.bin, which part identifies the major release number?

  • 1900
  • 15
  • 52
  • 2
  • 3

Explanation: The part of the image name 152-3 indicates that the major release is 15, the minor release is 2, and the new feature release is 3.

19. What statement describes a Cisco IOS image with the “universalk9_npe” designation for Cisco ISR G2 routers?

  • It is an IOS version that, at the request of some countries, removes any strong cryptographic functionality.
  • It is an IOS version that can only be used in the United States of America.
  • It is an IOS version that offers all of the Cisco IOS Software feature sets.
  • It is an IOS version that provides only the IPBase feature set.

Explanation: To support Cisco ISR G2 platforms, Cisco provides two types of universal images. The images with the “universalk9_npe” designation in the image name do not support any strong cryptography functionality such as payload cryptography to satisfy the import requirements of some countries. The “universalk9_npe” images include all other Cisco IOS software features.

20. A network engineer is upgrading the Cisco IOS image on a 2900 series ISR. What command could the engineer use to verify the total amount of flash memory as well as how much flash memory is currently available?

  • show boot memory
  • show flash0:
  • show interfaces
  • show startup-config
  • show version

Explanation: The show flash0: command displays the amount of flash available (free) and the amount of flash used. The command also displays the files stored in flash, including their size and when they were copied.

21. Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.)

  • Verify connectivity between the router and TFTP server using the ping command.
  • Verify that the checksum for the image is valid using the show version command.
  • Verify that the TFTP server is running using the tftpdnld command.
  • Verify the name of the TFTP server using the show hosts command.
  • Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.

22. Beginning with the Cisco IOS Software Release 15.0, which license is a prerequisite for installing additional technology pack licenses?

  • DATA
  • IPBase
  • SEC
  • UC

Explanation: Cisco IOS Software release 15.0 incorporates four technology packs. They are IPBase, DATA, UC (unified Communications), and SEC (Security). Having the IPBase license installed is a prerequisite for installing the other technology packs.

23. A network technician is troubleshooting problems with a router that is running IOS 15. Which command displays the features activated for the licenses that are installed on the router?

  • show boot memory
  • show flash0:
  • show license
  • show startup-config
  • show version

Explanation: The show license command displays all licenses that are installed on the system and both the activated and not activated features that are available.

24. How long is the evaluation license period for Cisco IOS Release 15.0 software packages?

  • 10 days
  • 15 days
  • 30 days
  • 60 days
  • 120 days

Explanation: Valuation licenses are good for a 60-day period. After 60 days, the evaluation license automatically changes to a Right-to-Use license.

25. Which command is used to configure a one-time acceptance of the EULA for all Cisco IOS software packages and features?

  • license accept end user agreement
  • license boot module module-name
  • license save
  • show license

Explanation: The license save command is used to back up a copy of the licenses on a device. The show license command is used to display additional information about Cisco IOS software licenses. The license boot module module-name command activates an Evaluation Right-to-Use license. To configure a one-time acceptance of the End User License Agreement (EULA) covering all Cisco IOS packages and features, use the license accept end user agreement command.

 

Subscribe
Notify of
guest

0 Comments
Inline Feedbacks
View all comments
0
Would love your thoughts, please comment.x
()
x