CCNA 1 ITNv6 Chapter 2: Check Your Understanding Answers

CCNA 1 v6.0 Chapter 2: Configuring a Network Operating System: Check Your Understanding Answers

1. What is the Cisco IOS?

  • The memory for the Cisco network device
  • The configuration for the Cisco network device
  • The operating system for the Cisco network device
  • The CPU for the Cisco network device

Explanation: The Cisco IOS (Internetworking Operating System) is the operating system used in most Cisco network devices.

2. What type of connection to a Cisco IOS switch is used to make the initial configuration?

  • AUX port
  • Console port
  • SSH
  • Telnet
  • Web interface

Explanation: The initial configuration of Cisco IOS devices is accomplished through the CLI on the console connection.

3. What command will display a list of keywords available for viewing the status of an IOS switch?

  • Switch#sh?
  • Switch#help
  • Switch#show ?
  • Switch#status ?

Explanation: Entering a question mark (?) after a command will show all additional commands and keywords to be used in the command sequence.

4. How is the Cisco IOS generally accessed and navigated?

  • Through the CLI using a terminal emulator
  • Using a web browser
  • With a Cisco-proprietary application
  • By the use of a custom GUI

Explanation: While there are some GUI interfaces available on Cisco IOS-based devices, the current practice is to use the CLI for device configuration and troubleshooting.

5. What is initially entered at the CLI of the Cisco IOS when typing a command sequence?

  • Argument
  • A space
  • Command
  • Keyword

Explanation: The IOS command parser inspects the first entries of a command sequence, expecting to identify a known command.

6. When the command “Switch(config)#hostname EASt-2+56” is entered in a Cisco IOS device using the CLI, what will be returned in the CLI?

  • Switch(config)#
  • % Invalid input detected
  • EaSt-2+56(config)#
  • EaSt-58(config)#
  • East-2+56(config)#
  • Switch EaSt-2+56(config)#

Explanation: When the device’s host name is configured, this name is used verbatim in the CLI prompt.

7. What is the primary defense against unauthorized remote access to network devices?

  • Configuring a default gateway
  • Configuring an IP address
  • Configuring a VTY password
  • Configuring a console password

Explanation: Forcing authentication for remote access by requiring a password to remotely connect to a network is a basic security measure. Option C provides the configuration to require authentication of users for remote access. In practice, stronger authentication should be required.

8. Where is the configuration used during startup on Cisco IOS devices located?

  • Running config
  • Startup config
  • Terminal emulator

Explanation: The startup config provides the configuration for the operation of the IOS device during startup.

9. What is the purpose of the following switch configuration?

s1(config)# interface vlan 1
s1(config-if)# ip address
s1(config-if)# no shutdown
s1(config-if)# exit
  • Allows communication to manage the switch
  • Allows the switch to forward traffic
  • Allows the switch to provide name resolution
  • Allows dynamic host configuration

Explanation: This configuration provides connectivity to the switch. Option B is incorrect as a switch will forward traffic without any configuration. The other two options, C and D, have no relation to this configuration.

10. From the CLI of a switch with an address of, what command would be used to verify end-to-end connectivity to another host?

  • show ip interface brief
  • ping
  • ping
  • ping

Explanation: This provides a ping to a remote host. Option A is does not verify connectivity. Option B verifies that the logical IP stack has been configured. Option C verifies the configuration of the local host.

Notify of

Inline Feedbacks
View all comments