CCNA 2 Module 2 V3.1 Answers
1. Which keystrokes can be used to return to the privileged mode from the interface configuration mode?
Ctrl-P
Ctrl-Shift-6, then X
Ctrl-Z
Esc
2. Which connection method can be used to perform the initial configuration of a router?
use a serial connection of a computer connected to the console port of a router
telnet to the router through a serial port
use a vty port through the Ethernet interface
use a modem connected to the AUX port of the router
3. Which tasks can be performed in the ROM monitor mode? (Choose two.)
recover from system failures
create startup configuration files
recover from lost passwords
configure IP addresses on all router interfaces
perform high level diagnostics
4. What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.)
the last restart method
the command buffer contents
the amount of NVRAM and FLASH used
the configuration register settings
the location from where the IOS loaded
5. Under what conditions does the router enter setup mode? (Choose three.)
immediately after issuing the command Router#erase start
after issuing the command Router#setup
during the initial configuration of a router
after deleting the backup configuration and reloading the router
after deleting the running configuration
6. Which keystroke is used to move to the beginning of a command line?
Ctrl-A
Ctrl-B
Esc-A
Esc-B
Ctrl-C
Ctrl-Z
7. Which tasks can be accomplished by using the command history feature? (Choose two.)
View a list of commands entered in a previous session.
Recall up to 15 command lines by default.
Set the command history buffer size.
Recall previously entered commands.
Save command lines in a log file for future reference.
8. What information does the name of the IOS file provide to the network administrator? (Choose three.)
the amount of NVRAM required to run the image
the hardware platform the image runs on
the various software platforms the image can run on
special features and capabilities of the image
the bandwidth supported by the IOS
where the image executes from and if it has been compressed
9. When the router output is being viewed through a terminal program, which statements are true regarding the --More-- prompt at the bottom of the router display? (Choose two.)
Press the Spacebar to display the next line.
Press the Spacebar to view the next screen.
Press the PgDn key to view the next screen.
Press the Enter key to display the next line.
Press the Enter key to view the next screen.
10. Which command takes precedence if the commands enable password and enable secret are both configured on a router?
enable password
enable secret
Neither. They are both enabled.
Neither. They cancel each other out.
11.
Which of the following identifies the correct items needed to initially configure a router?
1) DB-9-to-RJ-45 on the PC's serial port
2) a straight through cable
3) the router's console port
1) PC's Ethernet port
2) a crossover cable
3) the router's Ethernet port
1) DB-9-to-RJ-45 on the PC's serial port
2) a rollover cable
3) the router's Ethernet port
1) PC's Ethernet port
2) a rollover cable
3) the router's console port
1) DB-9-to-RJ-45 on the PC's serial port
2) a rollover cable
3) the router's console port
1) PC's Ethernet port
2) a rollover cable
3) the router's Ethernet port
12. A network administrator needs to configure a router. Which of the following connection methods requires network functionality to be accessible?
console
AUX
Telnet
modem
13. After the active IOS image has been loaded into RAM from flash memory, which commands could be used be used to display the file name of the active IOS? (Choose two.)
Router# show IOS
Router# show flash
Router# show nvram
Router# show version
Router# show startup-config
Router# show running-config
14. What does the command sh? return as output if issued at the Router# prompt?
all show commands allowed in privileged mode
all commands beginning with the letters sh
an incomplete command error message
an invalid command error message
15. Which of the following is the correct flow of routines for a router startup?
load bootstrap, load IOS, apply configuration
load bootstrap, apply configuration, load IOS
load IOS, load bootstrap, apply configuration, check hardware
check hardware, apply configuration, load bootstrap, load IOS
16. Which of the following statements concerning router interface modes are correct? (Choose three.)
User EXEC mode provides commands to monitor router operation.
Privileged EXEC mode only provides commands to change or configure router operation.
Password protected configuration modes can be accessed from either user EXEC or privileged EXEC modes.
On a router with the name Core1, the prompt indicating privileged EXEC mode is Core1#.
The command to enter privileged EXEC mode is Router# enable.
A username and password may be required to enter privileged EXEC mode.
17. What baud rate needs to be configured on terminal emulation software to allow a connection to the console port of a router?
2400
4800
9600
14200
38400
18. Cisco IOS software is separated into two levels as a security feature. What are those two levels? (Choose two.)
global
privileged
local
user
interface
19. What is the default sequence for loading the configuration file?
NVRAM, FLASH, ROM
FLASH, TFTP,CONSOLE
NVRAM, TFTP, CONSOLE
FLASH, TFTP, ROM
Leave a Reply