Session 5 Flashcards

1
Q

Which are categories within the logging severity levels? Choose four answers.

Choices:

A - Severe
B - Critical
C - Impactful
D - Normal
E - Debug
F - Warning
A

A - Severe
C - Impactful
D - Normal
E - Debug

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which type of logging allows a user to store several messages and view all of them at once?

Choices:

A - Console
B - Trap
C - Monitor
D - Buffer

A

D - Buffer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which command will set a syslog server to receive messages with a severity level of warning or higher?

Choices:

A - Logging trap 3
B - Logging trap 4
C - Logging trap 5
D - Logging trap 6

A

B - Logging trap 4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which are common methods used to back up configurations? Choose three answers.

Choices:
A - FTP
B - STF
C - MTP
D - TFTP
E - SCP
A

A - FTP
D - TFTP
E - SCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which steps are necessary for restoring an image on a Cisco device? Choose two answers.

Choices:

A - Copy the image from a TFTP server to running-config
B - Copy the image from a TFTP server to startup-config
C - Run the reload command
D - Run the replace command

A

B - Copy the image from a TFTP server to startup-config

C - Run the reload command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A user should be in which mode in order to back up a configuration?

Choices:

A - Enable
B - Copy
C - Backup
D - Configure

A

A - Enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which Cisco Discovery Protocol command will show the operating system and version utilized on
neighboring devices?

Choices:

A - Show cdp
B - Show cdp neighbors
C - Show cdp neighbors os
D - Show cdp neighbors detail

A

D - Show cdp neighbors detail

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which are the two main protocols used for discovery purposes on Cisco devices?

Choices:

A - CDP
B - FTP
C - LLDP
D - IEEE

A

A - CDP

C - LLDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which commands are used to enable LLDP for both incoming and outgoing updates? Choose three
answers.

Choices:

A - Lldp run
B - Lldp enable
C - Lldp receive
D - Lldp transmit

A

A - Lldp run
C - Lldp receive
D - Lldp transmit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which are the four parts that make up a universal image?

Choices:

A - Image
B - IP Base
C - Sound
D - Security
E - Voice
F - Data
A

B - IP Base
D - Security
E - Voice
F - Data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which are the four logging services?

Choices:

A - Console
B - Monitor
C - Data
D - Buffered
E - Syslog
F - Warning
A

A - Console
B - Monitor
D - Buffered
E - Syslog

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which is the first command to use when setting up a timezone for a device?

Choices:

A - Timezone
B - Clock
C - MST
D - UTC

A

B - Clock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the IPv6 loopback address on a device?

Choices:

A - ::1
B - :1:
C - 1::
D - ::2

A

A - ::1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

When a device is configured, which are two standpoints by which it should be secured?

Choices:

A - No passwords
B - Traffic should be made public
C - Users must be authorized
D - Users must pay for private information
E - Private traffic should be encrypted
A

C - Users must be authorized

E - Private traffic should be encrypted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

In order to redo the configuration on a router, which command should be used?

Choices:

A - Reload
B - Restart
C - Reroute
D - Setup

A

A - Reload

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which connection methods use a virtual terminal password? Choose two answers.

Choices:

A - FTP
B - SSH
C - Telnet
D - Console

A

B - SSH

C - Telnet

17
Q

If no NVRAM is present, which mode can be utilized?

Choices:
A - Startup
B - Setup
C - Configuration
D - Running-configuration
A

B - Setup

18
Q

Which commands, when used together, set up Telnet and SSH connections with usernames and
passwords? Choose two answers.

Choices:

A - Line console
B - Login local
C - Local login
D - Line vty

A

B - Login local

D - Line vty

19
Q

Which reliable system is not secure because data is transmitted in plaintext to connect?

Choices:

A - Telbot
B - Secure Shell
C - Security Shell
D - Telnet

A

D - Telnet

20
Q

Which step is often overlooked when attempting to run Telnet or SSH?

Choices:

A - Output
B - Input
C - Transport
D - Transfer

A

C - Transport

21
Q

Which are different types of banners that can be assigned on the router? Choose three answers.

Choices:
A - Router
B - Message of the day
C - Letter
D - Login
E - Text
F - Exec
A

B - Message of the day
D - Login
F - Exec

22
Q

Once a user has obtained the new IOS image for a Cisco upgrade, where can the image be placed?
Choose three answers.

Choices:

A - TFTP server
B - FTP server
C - Desktop
D - Floppy disk
E - Online
F - USB flash drive
A

A - TFTP server
B - FTP server
F - USB flash drive

23
Q

Which can the show file systems command show file systems for? Choose three answers.

Choices:
A - Image file
B - USB flash
C - Monitor
D - NVRAM
E - Disk
A

B - USB flash
D - NVRAM
E - Disk

24
Q

Which is a common IOS tool to use when troubleshooting?

Choices:

A - Ping tool
B - Ring tool
C - Command tool
D - Log tool

A

A - Ping tool

25
Q

Which is a command used to see events from a Telnet or SSH session?

Choices:

A - ROM monitor
B - Terminal monitor
C - Logging monitor
D - Submonitor

A

B - Terminal Monitor

26
Q

By default, logging history is set to log anything above a __________.

Choices:

A - notification
B - debug
C - criticism
D - warning

A

D - warning