CCNA 2 Module 2 V3.1 Answers

1. Which keystrokes can be used to return to the privileged mode from the interface configuration mode?

Ctrl-P

Ctrl-Shift-6, then X

Ctrl-Z

Esc

 

2. Which connection method can be used to perform the initial configuration of a router?

use a serial connection of a computer connected to the console port of a router

telnet to the router through a serial port

use a vty port through the Ethernet interface

use a modem connected to the AUX port of the router

 

3. Which tasks can be performed in the ROM monitor mode? (Choose two.)

recover from system failures

create startup configuration files

recover from lost passwords

configure IP addresses on all router interfaces

perform high level diagnostics

 

4. What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.)

the last restart method

the command buffer contents

the amount of NVRAM and FLASH used

the configuration register settings

the location from where the IOS loaded

 

5. Under what conditions does the router enter setup mode? (Choose three.)

immediately after issuing the command Router#erase start

after issuing the command Router#setup

during the initial configuration of a router

after deleting the backup configuration and reloading the router

after deleting the running configuration

 

6. Which keystroke is used to move to the beginning of a command line?

Ctrl-A

Ctrl-B

Esc-A

Esc-B

Ctrl-C

Ctrl-Z

 

7. Which tasks can be accomplished by using the command history feature? (Choose two.)

View a list of commands entered in a previous session.

Recall up to 15 command lines by default.

Set the command history buffer size.

Recall previously entered commands.

Save command lines in a log file for future reference.

 

8. What information does the name of the IOS file provide to the network administrator? (Choose three.)

the amount of NVRAM required to run the image

the hardware platform the image runs on

the various software platforms the image can run on

special features and capabilities of the image

the bandwidth supported by the IOS

where the image executes from and if it has been compressed

 

9. When the router output is being viewed through a terminal program, which statements are true regarding the --More-- prompt at the bottom of the router display? (Choose two.)

Press the Spacebar to display the next line.

Press the Spacebar to view the next screen.

Press the PgDn key to view the next screen.

Press the Enter key to display the next line.

Press the Enter key to view the next screen.

 

10. Which command takes precedence if the commands enable password and enable secret are both configured on a router?

enable password

enable secret

Neither. They are both enabled.

Neither. They cancel each other out.

 

11.

 CCNA 2 Module 2 V3.1 Answers (1)
Which of the following identifies the correct items needed to initially configure a router?

1) DB-9-to-RJ-45 on the PC's serial port
2) a straight through cable
3) the router's console port

1) PC's Ethernet port
2) a crossover cable
3) the router's Ethernet port

1) DB-9-to-RJ-45 on the PC's serial port
2) a rollover cable
3) the router's Ethernet port

1) PC's Ethernet port
2) a rollover cable
3) the router's console port

1) DB-9-to-RJ-45 on the PC's serial port
2) a rollover cable
3) the router's console port

1) PC's Ethernet port
2) a rollover cable
3) the router's Ethernet port

 

12. A network administrator needs to configure a router. Which of the following connection methods requires network functionality to be accessible?

console

AUX

Telnet

modem

 

13. After the active IOS image has been loaded into RAM from flash memory, which commands could be used be used to display the file name of the active IOS? (Choose two.)

Router# show IOS

Router# show flash

Router# show nvram

Router# show version

Router# show startup-config

Router# show running-config

 

14. What does the command sh? return as output if issued at the Router# prompt?

all show commands allowed in privileged mode

all commands beginning with the letters sh

an incomplete command error message

an invalid command error message

 

15. Which of the following is the correct flow of routines for a router startup?

load bootstrap, load IOS, apply configuration

load bootstrap, apply configuration, load IOS

load IOS, load bootstrap, apply configuration, check hardware

check hardware, apply configuration, load bootstrap, load IOS

 

16. Which of the following statements concerning router interface modes are correct? (Choose three.)

User EXEC mode provides commands to monitor router operation.

Privileged EXEC mode only provides commands to change or configure router operation.

Password protected configuration modes can be accessed from either user EXEC or privileged EXEC modes.

On a router with the name Core1, the prompt indicating privileged EXEC mode is Core1#.

The command to enter privileged EXEC mode is Router# enable.

A username and password may be required to enter privileged EXEC mode.

 

17. What baud rate needs to be configured on terminal emulation software to allow a connection to the console port of a router?

2400

4800

9600

14200

38400

 

18. Cisco IOS software is separated into two levels as a security feature. What are those two levels? (Choose two.)

global

privileged

local

user

interface

 

19. What is the default sequence for loading the configuration file?

NVRAM, FLASH, ROM

FLASH, TFTP,CONSOLE

NVRAM, TFTP, CONSOLE

FLASH, TFTP, ROM

Leave a Reply