ICND1 - Part 9 Quiz Flashcards
What is the function of Syslog?
a. To report issues with various environmental problems.
b. To report issues with link instability.
c. To report when a user made a change to the device.
d. To report when there is an IP conflict.
e. All of the above.
e. All of the above.
Log severity levels 0 and 1 are considered what?
a. Impactful
b. Severe
c. Normal
d. Debug
b. Severe
What is syslog level 7?
a. Debug
b. Informational
c. Alert
d. Emergency
e. Critical
f. Error
g. Warning
a. Debug
How can the console be configured to report level 4 and below to the syslog?
a. Logging console 4
b. Logging monitor 4
c. Logging console 5
d. Logging monitor 5
e. None of the above
a. Logging console 4
NTP clients adjust their time based on what they hear from an NTP server.
a. True
b. False
a. True
NTP Servers/Clients play both roles. They connect to a server for timing while supplying time to other devices.
a. True
b. False
a. True
What is an effective way to ensure NTP is always accessible?
a. Use a router interface that has the highest bandwidth.
b. Use a router interface that has the highest reliability.
c. Use a router interface that has the lowest bandwidth.
d. Use a loopback interface as a source for NTP.
d. Use a loopback interface as a source for NTP.
What information is revealed by CDP?
a. Address list (Layer 2 and 3)
b. Port identifier
c. Device identifier
d. Platform
e. Capabilities List
f. All of the above
f. All of the above
What command will let me see one line information about each neighbor?
a. Show cdp neighbors detail
b. Show cdp entry
c. Show cdp neighbors
d. Show cdp brief
c. Show cdp neighbors
How can I encrypt all current and future plain-text passwords?
a. Username cisco secret cisco
b. Enable secret cisco
c. Service password-encryption
d. Password encryption
c. Service password-encryption
If both enable secret and enable password are configured, which one will take precedence?
a. Enable secret
b. Enable password
a. Enable secret
When configuring banners and connecting via console or telnet, in what order are the MOTD, login, and exec banners shown?
a. Login, MOTD, exec
b. MOTD, exec, Login
c. MOTD, login, exec
d. Exec, login, MOTD
c. MOTD, login, exec
What is a DMZ?
a. An area of the network dedicated to servers that need to provide a service to the outside world and are located between an internal and external firewall.
b. An area of the network dedicated to servers that need to provide a service outside of the network and are located between an internal firewall and edge router.
c. An area of the network dedicated to servers that need to provide a service to the outside world and are located inside the main network behind a firewall.
d. None of the above
a. An area of the network dedicated to servers that need to provide a service to the outside world and are located between an internal and external firewall.
When copying files from a TFTP server to a flash device on a router, what command would I use?
a. Copy flash tftp
b. Copy tftp ROM
c. Copy tftp flash
d. Copy flash ROM
c. Copy tftp flash
Why would I verify the MD5 hash of a Cisco IOS?
a. To compare it to the website I got it from to ensure it is the same IOS.
b. To compare it to Cisco.com’s MD5 hash to verify authenticity.
c. To compare it and make sure that the Cisco router does not see any errors.
d. To compare it and make sure the Cisco router does not discover it is a modified version
b. To compare it to Cisco.com’s MD5 hash to verify authenticity.