Exam Cram Flashcards
Which of the following converts the four-wire BRI signals from an S/T interface into two-wire signals of a U interface? A. TE1 B. NT-2 C. NT-1 D. TE2 E. TA
The TA converts EIA/TIA-232 and other signals into BRI signals.
True or false. The service password-encryption command encrypts all the passwords on the device with the exception of the enable secret, which uses a hash.
True.
Which of the following is microcode used to test the basic functionality of the router hardware and determine the router hardware configuration? A. Bootstrap code B. ROMMON C. POST D. “Mini” IOS software file
Answer: D. The mini-IOS software file is a subset of the Cisco IOS for loading a new IOS image into flash and performing other maintenance operations.
What command changes the duplex setting for an individual interface on a Catalyst switch? A. SW1#duplex full B. SW1#set duplex full C. SW1(config)#duplex full D. SW1(config)#set duplex full E. SW1(config-if)#duplex full F. SW1(config-if)#set duplex full
Answer: E. You make this configuration setting on a particular interface, thus the need to be in Interface Configuration mode.
Which of the following designates a device such as a PC or router requiring a TA to adapt communication for BRI signals? A. TE1 B. NT-2 C. NT-1 D. TE2
Answer: D. TE2 is a device such as a PC or router that requires a TA to adapt communication for BRI signals.
Which of the following is used to bring the router up during initialization and reads the configuration register to determine how to boot? A. Bootstrap code B. ROMMON C. POST D. “Mini” IOS software file
Answer: D. The mini-IOS software file is a subset of the Cisco IOS for loading a new IOS image into flash and performing other maintenance operations.
Views are very useful in creating role-based rules as to which commands are authorized for execution. Examine the sequence of commands and choose all the correct statements from the list that follows them. CiscoISR(config)#aaa new-model CiscoISR#enable view Password: enablesecretpassword CiscoISR#config terminal Enter configuration commands, one per line. End with CNTL/Z. CiscoISR(config)#parser view ISP CiscoISR(config-view)#secret 0 hardtoguess CiscoISR(config-view)#commands exec include ping CiscoISR(config-view)#commands exec include all configure A. The aaa new-model command is required before a view can be created. B. The user who accesses the ISP view will require the password hardtoguess. C. The user who accesses the ISP view will be authorized to use the ping command. D. The user who accesses the ISP view will not be authorized to use the copy running-config startup-config command. E. None of the above.
The correct answers are A, B, C, and D. Answer D is also correct because after logging into the view, only the commands specified will be authorized to be executed.
Which of the following contribute to congestion on an Ethernet network? (Choose two.) A. Creation of a new collision domain B. Creation of a new VLAN C. Addition of a hub to the network D. Use of switches in the network E. Amount of ARP or IPX SAP traffic
Answers: C and E. Hubs work on half-duplex mode. If more devices connect to a hub and are sending simultaneously, collisions occur. ARP and IPX SAP traffic is broadcast-based and also creates congestion in the network.
Which of the following converts EIA/TIA-232, V.35, and other signals into BRI signals? A. TE1 B. NT-2 C. NT-1 D. TE2 E. TA
Answer: E. The TA converts EIA/TIA-232 and other signals into BRI signals.
Which of the following is capable of loading a new IOS image into flash and performing other maintenance operations? A. Bootstrap code B. ROMMON C. POST D. “Mini” IOS software file
Answer: D. The mini-IOS software file is a subset of the Cisco IOS for loading a new IOS image into flash and performing other maintenance operations.
With respect to AAA, access to the router is called remote ________ access and access through the router is called remote ________ access. (Pick the answer that fills in the blanks in the correct order.) A. Network, administrative B. Vty, packet C. Administrative, network D. Proxy, cut-through E. None of the above.
The correct answer is C.
Which of the following are required for a switch to be managed remotely via Telnet from another IP subnet? (Choose two.) A. An IP address on the switch B. A routing protocol C. Full-duplex connections D. A default gateway on the switch E. A static route from the switch to a router
Answers: A and D. For an administrator to remotely manage a switch, an IP address must be assigned, and a default gateway must be set for return traffic.
One of the switches in your network fails, but you have redundant UTP cabling to another switch in place. Assuming that the default convergence parameters have not been altered, how long before your backup switch will be able to forward frames on all segments? A. Immediately B. 10 seconds C. 40 seconds D. 50 seconds
Answer: D. Spanning-Tree Protocol (STP) ensures that there are no loops in your redundant switched network. When a port or switch fails, STP converges through four stages, taking approximately 50 seconds to do so.
You want to view the IOS image that is currently stored in flash. What command displays the image? A. show ios B. show flash C. ls flash D. list flash
Answer: B. The show flash command lists the contents of flash memory, including the IOS image file stored there
What are the three main task areas for setting up external AAA? Choose from the following list: A. Set up users (server). B. Configure the AAA network (client and server). C. Install AAA 802.1X supplicant support in SDM (client). D. Identify traffic to which AAA will be applied (client). E. Choose digital certificates to authenticate the AAA server to the client (and vice versa).
The correct answers are A, B, and D.
Which of the following reference points refers to the connection between a non–ISDN-compatible device and a terminal adapter? A. R B. S C. T D. U
Answer: A. The R reference point refers to the connection between a non–ISDN-compatible device and a terminal adapter.
In Spanning-Tree Protocol, what describes the state at which the root bridge has been elected and all ports are either in their blocked or forwarding state? A. Stable B. Blocking C. Converged D. Static
Answer: C. When STP is merely monitoring the switched network and all ports are in their appropriate blocking or forwarding state, it is known as a converged network.