Modules 17 – 20: Introduction to Cisco Networking Group Exam Answers

Networking Essentials ( Version 2) – Modules 17 – 20: Introduction to Cisco Networking Group Exam

How to find: Press “Ctrl + F” in the browser and fill in whatever wording is in the question to find that question/answer. If the question is not here, find it in Questions Bank.

NOTE: If you have the new question on this test, please comment Question and Multiple-Choice list in form below this article. We will update answers for you in the shortest time. Thank you! We truly value your contribution to the website.

1. An administrator defined a local user account with a secret password on router R1 for use with SSH. Which three additional steps are required to configure R1 to accept only encrypted SSH connections? (Choose three.)

  • Generate the SSH keys.
  • Configure DNS on the router.
  • Generate two-way pre-shared keys.
  • Enable inbound vty Telnet sessions.
  • Enable inbound vty SSH sessions.
  • Configure the IP domain name on the router.

Explanation: There are four steps to configure SSH support on a Cisco router:
Step 1: Set the domain name.
Step 2: Generate one-way secret keys.
Step 3: Create a local username and password.
Step 4: Enable SSH inbound on a vty line.

2. A user experiences access and performance issues with the Internet connection from a home computer. The Internet connection is provided through a DSL line. The user calls the support line of the phone company for help. The support technician asks the user to connect the computer directly to the DSL modem. Which two pieces of information will help the technician to troubleshoot the problem? (Choose two.)

  • the model and vendor of the computer
  • when the problem started
  • the IP address of the computer
  • the MAC address of the Ethernet NIC on the computer
  • the number of times that the ping command was issued

Explanation: The timeline and the IP address will help the technician to troubleshoot and test to verify the problem. The timeline can be used to check the operation status of the DSL equipment in the phone company. The IP address can be used to verify if the DHCP is functional from the phone company. The MAC address of the Ethernet NIC is irrelevant because the connection is not an Ethernet connection. The technician should not assume that a client is technically savvy. If the ping command is necessary, the technician should instruct the client on how to issue the ping command.

3. What advantage does SSH offer over Telnet?

  • more connection lines
  • connection-oriented services
  • encryption
  • username and password authentication

Explanation: Both Telnet and SSH are used to remotely connect to a network device for management tasks. However, Telnet uses plaintext communications, whereas SSH provides security for remote connections by providing encryption of all transmitted data between devices.

4. Match the configuration mode with the command that is available in that mode. (Not all options are used.)

Modules 17 - 20: Introduction to Cisco Networking Group Exam Answers 1

Answers

Modules 17 - 20: Introduction to Cisco Networking Group Exam Answers 2

5. What type of cable is used to connect a workstation serial port to a Cisco router console port?

  • straight-through
  • rollover
  • coaxial
  • crossover

Explanation: UTP cable wire pairs can be terminated in different configurations for use in different applications. To use a UTP cable for consoling into a Cisco router from a PC serial port, it must be terminated as a rollover or console cable.

6. What are two requirements when using out-of-band configuration of a Cisco IOS network device? (Choose two.)

  • Telnet or SSH access to the device
  • a direct connection to the console or AUX port
  • HTTP access to the device
  • a terminal emulation client
  • a connection to an operational network interface on the device

Explanation: A connection to an operational network interface on the device, and Telnet, SSH, or HTTP access are required for in-band management of Cisco IOS networking devices.

7. When is an IP address required to be configured on a Cisco LAN switch?

  • when the switch is connected to another switch
  • when the switch must forward LAN traffic
  • when the switch needs to be managed through an in-band connection
  • when the switch is configured from a computer connected to the console port

Explanation: A LAN switch uses Layer 2 addresses to determine how to forward packets. An IP address is only necessary if the switch needs to be remotely managed through an in-band connection on the network.

8. When a router is powered on, where will the router first search for a valid IOS image to load by default?

  • flash memory
  • RAM
  • ROM
  • NVRAM

Explanation: By default, if no boot system commands are in the configuration, a router will load the first valid Cisco IOS image in flash memory and run it. RAM is active memory that is not used to store image files. NVRAM stores configuration files. ROM stores a minimal version of the Cisco IOS image that can be used to provide limited functions if a valid IOS image is not available in flash memory.

9. Following default settings, what two tasks are performed first in the router boot sequence? (Choose two.)

  • Load the running-config file from RAM.
  • Locate and load the operating system.
  • Locate and load the startup-config file from NVRAM.
  • Load the bootstrap program from ROM.
  • Perform the POST routine.

Explanation: There are three major steps to the router boot sequence:
Perform Power-On-Self-Test (POST) and load the bootstrap program.
Load the IOS from Flash or TFTP server.
Load the startup configuration file from NVRAM.

10. A network administrator is working on a Cisco router. The CLI prompt is Router1(config-if)#. Which operation is the administrator likely to configure next?

  • a LAN interface
  • the password that is required to access the privileged EXEC mode
  • the console port
  • the vty lines

Explanation: Cisco IOS uses different prompts to identify the specific configuration modes. The prompt Router1(config-if)# is a subconfiguration mode of Router(config)#. This mode indicates that the configuration commands that follow are applied to a LAN or WAN interface.

11. To save time, IOS commands may be partially entered and then completed by typing which key or key combination?

  • Tab
  • Up Arrow
  • Ctrl-P
  • Down Arrow
  • Ctrl-N
  • Right Arrow

12. A network administrator issues the Switch# show running-config command on a Cisco switch. Which term is used to describe the part ” running-config” in the command?

  • command
  • argument
  • keyword
  • hot key

Explanation: The running-config is a keyword of the show command.

13. Refer to the exhibit. Which element of IOS syntax is the expression MainOffice ?
Modules 17 - 20: Introduction to Cisco Networking Group Exam Answers 3

  • an argument
  • a subcommand
  • a command
  • a keyword

Explanation: An argument of a CLI command is generally not a predefined word, but rather is a value defined by the user. Keywords, however, describe specific parameters of a command that are predefined words that are known to the command interpreter.

14. A network administrator is troubleshooting inter-connection issues between routers. Which show command can be used to check the bandwidth and MTU settings of an interface?

  • show protocols
  • show ip route
  • show interfaces
  • show arp

Explanation: The show interfaces command displays the hardware settings of each interface, such as MTU, MAC address, and bandwidth.

15. What is the purpose of assigning an IP address to the VLAN1 interface on a Cisco Layer 2 switch?

  • to permit IP packets to be forwarded by the switch
  • to create a new IP local network on the switch
  • to enable remote access to the switch to manage it
  • to enable the switch to route packets between networks

Explanation: The VLAN 1 on a Cisco Layer 2 switch is a virtual interface. By default, VLAN 1 is assigned as the management interface for remote access (Telnet or SSH) to the device for management tasks. In order to allow remote access through the network, a valid IP address configuration is needed on VLAN 1.

16. Match the type of password on a Cisco device to the function.
Modules 17 - 20: Introduction to Cisco Networking Group Exam Answers 4

  • enable password: limits access to the privileged EXEC mode
  • vty password: limits access to the device through an SSH connection
  • console password: limits access to the device through an out-of-band connection
  • enable secret: encrypted and restricts access to the privileged EXEC mode

17. Which statement regarding the service password-encryption command is true?

  • It is configured in privileged EXEC mode.
  • To see the passwords encrypted by the service password-encryption command in plain text, issue the no service password-encryption command.
  • As soon as the service password-encryption command is entered, all currently set passwords formerly displayed in plain text are encrypted.
  • It encrypts only line mode passwords.

Explanation: The command service password-encryption is used to encrypt all the clear text passwords in the running-configuration file.

18. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

  • privileged EXEC mode
  • boot IOS mode
  • console interface
  • VTY interface
  • router configuration mode
  • Ethernet interface

Explanation: Access to the VTY and console interfaces can be restricted using passwords. Out-of-band management of the router can be restricted in both user EXEC and privileged EXEC modes.

19. A user can print to a printer that is on the same network, but the traffic of the user cannot reach the Internet. What is a possible cause of the problem?

  • The PC has an incorrect IP address.
  • The network cable connected to the user PC is faulty.
  • The NIC on the PC is faulty.
  • The PC default gateway address is missing or incorrect.

Explanation: The default gateway IP address is used to reach other networks, including the Internet.

20. For the second time in a week, workstations on a LAN are not able to log into a specific server. The technician fixed the problem the first time, but cannot remember the steps taken to solve it. What aspect of the troubleshooting process has the technician neglected?

  • documenting the troubleshooting process
  • identifying the problem
  • asking questions of end users
  • using structured techniques to solve a problem

Explanation: Proper documentation is a very important step in troubleshooting. The proper documentation can help troubleshoot the same or similar problems in the future.

21. Which utility can be used to view a list of open TCP connections on Linux or Windows systems?

  • Ping
  • Netstat
  • Ipconfig
  • Tracert

Explanation: Netstat is a utility that is available for both Linux and Windows systems. It is a utility that can be used to indicate that something or someone is connected to the local host. It lists the protocol in use, the local address and port numbers, the foreign address and port numbers, and the state of the connection.

22. Which three pieces of information are revealed by the ipconfig command (without the /all switch)? (Choose three.)

  • subnet mask
  • MAC address
  • default gateway
  • IP address
  • DHCP server
  • DNS server

Explanation: The ipconfig command is used to display the current TCP/IP network configuration values of the device. This includes the IP address; the subnet mask and the default gateway addresses. Using the ipconfig /all switch displays additional information like the physical address of the device and the DHCP server address among other things.

23. Which command can be used to verify connectivity between two host devices?

  • nslookup
  • ipconfig
  • netstat
  • ping

Explanation: The ping command can be used to test end-to-end connectivity between two host devices. It measures the round-trip time for a message to get from source to destination.

24. How does an activity LED on wireless routers indicate that traffic is moving through a port?

  • by flashing
  • by staying a solid amber color
  • by staying a solid green color
  • by staying turned off

Explanation: One of the first steps when using the bottom-up strategy of troubleshooting is to examine the LED lights of the device, which indicate the current state or activity of the device. LEDs may change color or flash to convey information. Although the exact configuration and meaning of LEDs varies between manufacturers and devices, a flashing light indicates flow of traffic.


Related Articles

guest
0 Comments
Inline Feedbacks
View all comments