Measure Up 100-105 Flashcards
You issue the show logging command on your router, and you see the output shown in the exhibit. Where will messages with a severity of informational be logged? (Choose two.)
Buffer
Monitor Connections
Syslog Server
Console
Buffer
Syslog Server
Your task is to secure the console port on a Cisco router. you have the following requirements:
- anyone with a valid username and password is allowed to connect.
- the session should time out after 10 minutes.
Which set of commands should you use?
Set A:
R1(config)#line vty 0 4
R1(config-line)#login
R1(config-line)#exec-timeout 10
Set B:
R1(config)#line console 0
R1(config-line)#login local
R1(config-line)#exec-timeout 10
Set C:
R1(config)#line console 0
R1(config-line)#login
R1(config-line)#exec-timeout 10
Set D:
R1(config)#line vty 0 4
R1(config-line)#login local
R1(config-line)#exec-timeout 10
Set B:
R1(config)#line console 0
R1(config-line)#login local
R1(config-line)#exec-timeout 10
You have made changes to the running configuration of the Cisco switch. you need to save the current configuration to the NVRAM and verify that the changes made to the current configuration have been actually saved in the NVRAM. Which two commands will help you complete the task? (Choose two.)
show running-config show version show startup-config copy startup-config running-config copy running-config startup-config
show startup-config
copy running-config startup-config
Based on the output from the show ip interface brief command on Core_Rtr_A shown in the exhibit, what does the down value in the Protocol field indicate? (Choose two.)
The physical layer is not functioning properly.
The interface is shutdown.
The data link layer is not functioning properly.
Remote keepalive messages are not being received.
The interface is operational.
The local cable is unplugged.
The data link layer is not functioning properly.
Remote keepalive messages are not being received.
Which command uses a series of packets with low Time-to-Live values (TTL) to determine a path in the network?
traceroute
ip route
ping
icmp
traceroute
Which two network utilities are often used to access and configure a remote Cisco device that is configured with an IP address? (Choose two.)
Ping FTP Traceroute Telnet SSH
Telnet
SSH
You are the network administrator for your company. One of the hosts cannot communicate with a host on a different network. Which Cisco Internetwork Operating System (IOS) command should you issue on the router to find the network path taken by the packets that are getting dropped?
extended ping ping tracert traceroute telnet
traceroute
You re experiencing some problems with your network, which is shown in the exhibit. You issue a ping command from Router A and get the following output:
Router_A#ping 192.168.7.1
Type escape sequence to abort.
Sending 5, 100-byte ICMP Echos to 192.168.7.1, timeout is 2 seconds:
.!!!!
Success rate is 890 percent (4/5), round-trip min/avg/max = 16/16/16 ms
Router_A#
What is a likely cause of the problem that is illustrated by the output of the ping command?
Router B had to issue an Address Resolution Protocol (ARP) request to Router A.
Router A had to issue an Address Resoltion Protocol (ARP) request to Router B.
There is no device with the address 192.168.7.1.
Router C did not receive the ping request.
Router A had to issue an Address Resoltion Protocol (ARP) request to Router B.
You are the network administrator for your company. you configure your network using the subnet 172.16.10.0/24. You are undable to access a remote host with the IP address 62.168.10.20. You check the connectivity using the ping command on the network router. The exhibit shows the output of the ping command. What conclusion can be drawn from the output?
A routing loop has occurred.
A router in the path did not have a route available to the destination.
The destination router was receiving a lot of traffic.
An access control list (ACL) blocked the ping request.
The firewall has blocked the ping request.
A router in the path did not have a route available to the destination.
Which two statement about the traceroute command are true? (Choose two.)
It is used to establish a remote connection over the Internet or Local Area Network(LAN).
It is used to determine the network points where packets are getting dropped.
It finds the path that a packet takes while it is transmitted to a remote destination.
It is used to display the route table information for a remote network.
It is used to make modifications to the console terminal settings.
It is used to determine the network points where packets are getting dropped.
It finds the path that a packet takes while it is transmitted to a remote destination.
You manage a network with multiple Cisco routers and switches. you receive new license files for the routers. you need to install the licenses on each router. What should you do? (Choose two.)
On each router, copy the license file using the copy tftp flash0: command.
On each router, run the license call-hose command.
On each router, copy the license file using the copy flash0: tftp command.
On each router, run the license install command.
On each router, copy the license file using the copy tftp flash0: command.
On each router, run the license install command.
You manage a network with multiple Cisco routers and switches. you receive a new product activation key (PAK) for the routers. You need to install the licenses on each router. What should you do?
On each router, run the license call-home command.
On each router, run the license install command.
On each router, copy the PAK using the copy tftp flash0: command.
On each router, copy the PAK using the copy flash0: tftp command.
On each router, run the license call-home command.
You upgrade the Internetwork Operating System (IOS) on your router. you decide to save a backup copy of the IOS file to your Trivial File transfer protocol (TFTP) server on the local network. Which IOS command should you use?k
Router#copy nvram tftp Router#copy tftp nvram Router#copy tftp system Router#copy system tftp Router#copy tftp flash Router#copy flash tftp
Router#copy flash tftp
you are configuring Cisco routers to use a third-party logging server. The logging server has an IP address of 192.168.1.100. All system events with a severity level of six or lower must be sent to the logging server with the current time. Which block of commands should you run?
Block 1: configure terminal logging 192.168.1.100 service timestamps log uptime logging monitor 6
Block 2: configure terminal logging 192.168.1.100 service timestamps log datetime logging monitor 6
Block 3: configure terminal logging 192.168.1.100 service timestamps log datetime logging trap 6
Block 4: configure terminal logging 192.168.1.100 service timestamps log uptime logging trap 6
Block 3: configure terminal logging 192.168.1.100 service timestamps log datetime logging trap 6
You recently started to manage a network with Cisco routers and switches. You do not know the password to one of the routers. you need to ensure that you can reset the password on the device. What should you do?
Boot the router to rommon and change the configuration register setting to 0x2142.
Boot the router to rommon and manually boot the device from flash memory.
boot the router to rommon and manually boot the device from a TFTP server.
Boot the router to rommon and change the configuration register setting to 0x2102
Boot the router to rommon and change the configuration register setting to 0x2142.
Which Cisco IOS command will generate the following output?
-#—length——-date/time———————–path
1 1336 Apr 08 2010 01:17:54 nvram
2 3273 Dec 01 2011 20:34:32 SDM_Backup
…
61521920 bytes available (68231168 bytes used)
Router#show running-config Router#show flash Router(config)#show running-config Router#show version Router(config)#show version Router(config)#show flash
Router#show flash
You have made some configuration changes to a router running in the network. you want to ensure that these changes are stored in memory so that these changes are available the next time the router is rebooted. Which Cisco IOS command should you use?
router>copy startup-config running0config
router(config)#copy startup-config running-config
router#copy startup-config running -config
router>copy running-config startup-config
router#copy running-config startup-config
router(config)#copy running-config startup-config
router#copy running-config startup-config
You recently completed initial configuration of a router. A new network administrator executes a series of commands on the router that results in changes to that configuration, which he then saves to startup-config. you saved a backup copy of your configuration firle on your Trivial File transfer Protocol (TFTP) server. you want to restore your configuration file from the TFTP server to non-volatile random access memory (NVRAM) on the router. Which IOS command should you use to restore the configuration file?
router#copy tftp flash router#copy tftp running-config router#copy tftp startup-config router#copy running-config tftp router#copy flash tftp router#copy startup-config tftp
router#copy tftp startup-config
Your network has five routers and 20 switches. you need to configure each device to synchronize the logs during telnet sessions. Which commands should you execute on each device?
configure terminal
line console 0
logging trap 5
configure terminal
line vty 0 15
logging trap 5
configure terminal
line vty 0 15
logging synchronous 5
configure terminal
line console 0
logging synchronous 5
configure terminal
line vty 0 15
logging synchronous 5
What are three ways to mitigate a password attack? (Choose three.)
Disconnect the network from the outside world.
Use strong passwords.
Disable an account after a specific number of unsuccessful login attempts.
Do not use the same password on more than one system.
Maintain spares for critical components.
use plaintext passwords.
Use strong passwords.
Disable an account after a specific number of unsuccessful login attempts.
Do not use the same password on more than one system.
Which two statements regarding Secure Shell (SSH) access to network devices are true? (Choose two.)
All information from the network device is sent in clear text.
All information from the network device is encrypted.
All keystrokes to the network Device are sent in clear text.
All keystrokes to the network device are encrypted.
SSH version 1 (SSHv1) is recommended.
All information from the network device is encrypted.
All keystrokes to the network device are encrypted.
You are configuring a new router for your network and want to make access to the router secure. What are three recommended practices for securing router access? (Choose three.)
Use a login banner to display a warning message before the login prompts.
Configure both an enable password and an enable secret command to ensure that if you forget the password configured with the enable secret command, you can use the password configured with the enable password command.
Use Secure Shell (SSH) rather than Telnet to establish a connection on the console line.
Use the same password on the console line and on all virtual terminal (vty) lines.
Encrypt all passwords in the running configuration file by using the service password-encryption command.
Use mixed case passwords.
Use a login banner to display a warning message before the login prompts.
Use the same password on the console line and on all virtual terminal (vty) lines.
Encrypt all passwords in the running configuration file by using the service password-encryption command.
Use mixed case passwords.
You want to make sure that only Secure Shell (SSH) connections are allowed on the vty lines of your router. Anyone attempting to Telnet into the router should not be successful. Which command ensures that only SSH sessions are allowed?
Router(config-line)#transport input ssh
Router(config)#ip ssh version 2
Router(config)#transport input ssh
Router(config-line)#transport input ssh telnet
Router(config)#transport input ssh telnet
Router(config-line)#transport input ssh
You are the network administrator of your company. you have set up a new Cisco router on the network. you want to display a message stating, “Access limited to authorized Administrators only” to anyone who connects to the router. Which Cisco IOS command should you use to display this message?
Router# banner login % Router# banner motd % Router(config)# banner motd# Router(config-line)# banner motd $ Router(config-line)# banner login $ Router (config)# banner login #
Router(config)# banner motd#