CCNA 2 v6.0 (Routing & Switching Essentials v6) Chapter 10: Device Discovery, Management, and Maintenance: Check Your Understanding Questions Answers
1. What is a difference between CDP and LLDP?
- CDP can gather information from routers, switches, and wireless APs, whereas LLDP can only gather information from routers and switches.
- CDP can obtain both Layer 2 and Layer 3 information, whereas LLDP can only obtain Layer 2 information.
- CDP is a proprietary protocol, whereas LLDP is a vendor-neutral protocol.
- CDP is enabled on an interface using two commands, whereas LLDP requires only one command.
2. A network administrator wants to configure a router so that only a specific interface will send and receive CDP information. Which two configuration steps accomplish this? (Choose two.)
- R1(config)# no cdp enable
- R1(config)# no cdp run
- R1(config-if)# cdp enable
- R1(config-if)# cdp run
- R1(config-if)# cdp receive
- R1(config-if)# cdp transmit
3. What information can be gathered about a neighbor device from the show cdp neighbors detail command that cannot be found with the show cdp neighbors command?
- The capabilities of the neighbor
- The hostname of the neighbor
- The IP address of the neighbor
- The platform that is used by the neighbor
4. What is the configuration command to globally enable LLDP on a Cisco Catalyst switch?
- enable lldp
- feature lldp
- lldp enable
- lldp run
5. Which option correctly enables LLDP on an interface?
- R1(config-if)# lldp enable
- R1(config-if)# lldp enable
R1(config-if)# lldp receive - R1(config-if)# lldp receive
R1(config-if)# lldp transmit - R1(config-if)# lldp enable
R1(config-if)# lldp receive
R1(config-if)# lldp transmit
6. What are the most common syslog messages?
- Error messages about hardware or software malfunctions
- Link up and link down messages
- Output messages that are generated from debug output
- Those that occur when a packet matches a parameter condition in an access control list
7. When logging is used, which severity level indicates that a device is unusable?
- Level 0—Emergency
- Level 1—Alert
- Level 2—Critical
- Level 3—Error
8. Which protocol or service allows network administrators to receive system messages that are provided by network devices?
- NTP
- NetFlow
- SNMP
- Syslog
9. Which syslog message type is accessible only to an administrator via the Cisco CLI?
- Alerts
- Debugging
- Emergency
- Errors
10. Which destination do Cisco routers and switches use by default when sending syslog messages for all severity levels?
- RAM
- NVRAM
- Nearest syslog server
- Console
11. A network administrator has issued the logging trap 4 global configuration mode command. What is the result of this command?
- The syslog client sends to the syslog server any event message that has a severity level of 4 and lower.
- The syslog client sends to the syslog server event messages with an identification trap level of only 4.
- The syslog client sends to the syslog server any event message that has a severity level of 4 and higher.
- After four events, the syslog client sends an event message to the syslog server.
12. The command ntp server 10.1.1.1 is issued on router R1. What impact does this command have?
- Identifies the NTP server that R1 will use to send system log messages to
- Identifies the NTP server that R1 will use to store backup configurations
- Identifies R1 as the NTP server using IP address 10.1.1.1
- Synchronizes the clock of R1 with the timeserver at IP address 10.1.1.1
13. Which two statements are true about NTP servers in an enterprise network? (Choose two.)
- All NTP servers synchronize directly to a stratum 1 time source.
- NTP servers at stratum 1 are directly connected to an authoritative time source.
- NTP servers control the mean time between failures (MTBF) for key network devices.
- NTP servers ensure an accurate time stamp on logging and debugging information.
- There can be only one NTP server on an enterprise network.
14. What can a network administrator do to access a router if the password has been lost?
- Access the router remotely through Telnet, and use the show running-config command.
- Boot the router into ROMMON mode and reinstall the IOS from a TFTP server.
- From ROMMON mode, configure the router to ignore the startup configuration when the router initializes.
- Reboot the router and use the break key sequence to bypass the password during IOS bootup.
15. An administrator issues the command confreg 0x2142 at the rommon 1> prompt. What is the effect when this router is rebooted?
- Contents in NVRAM will be erased.
- Contents in NVRAM will be ignored.
- Contents in RAM will be erased.
- Contents in RAM will be ignored.
16. A network technician is attempting a password recovery on a router. From ROMMON mode, which command must be entered to bypass the startup configuration file?
- rommon> config-register 0x2102
- rommon> confreg 0x2102
- rommon> config-register 0x2142
- rommon> confreg 0x2142
17. What must an administrator have in order to reset a lost password on a router?
- A crossover cable
- A TFTP server
- Access to another router
- Physical access to the router
18. In the IOS image named c1900-universalk9-mz.SPA.152-3.T.bin, which part identifies the major release number?
- 1900
- 15
- 52
- 2
- 3
19. What statement describes a Cisco IOS image with the “universalk9_npe” designation for Cisco ISR G2 routers?
- It is an IOS version that, at the request of some countries, removes any strong cryptographic functionality.
- It is an IOS version that can only be used in the United States of America.
- It is an IOS version that offers all of the Cisco IOS Software feature sets.
- It is an IOS version that provides only the IPBase feature set.
20. A network engineer is upgrading the Cisco IOS image on a 2900 series ISR. What command could the engineer use to verify the total amount of flash memory as well as how much flash memory is currently available?
- show boot memory
- show flash0:
- show interfaces
- show startup-config
- show version
21. Which two conditions should the network administrator verify before attempting to upgrade a Cisco IOS image using a TFTP server? (Choose two.)
- Verify connectivity between the router and TFTP server using the ping command.
- Verify that the checksum for the image is valid using the show version command.
- Verify that the TFTP server is running using the tftpdnld command.
- Verify the name of the TFTP server using the show hosts command.
- Verify that there is enough flash memory for the new Cisco IOS image using the show flash command.
22. Beginning with the Cisco IOS Software Release 15.0, which license is a prerequisite for installing additional technology pack licenses?
- DATA
- IPBase
- SEC
- UC
23. A network technician is troubleshooting problems with a router that is running IOS 15. Which command displays the features activated for the licenses that are installed on the router?
- show boot memory
- show flash0:
- show license
- show startup-config
- show version
24. How long is the evaluation license period for Cisco IOS Release 15.0 software packages?
- 10 days
- 15 days
- 30 days
- 60 days
- 120 days
25. Which command is used to configure a one-time acceptance of the EULA for all Cisco IOS software packages and features?
- license accept end user agreement
- license boot module module-name
- license save
- show license