АвтоАвтоматизацияАрхитектураАстрономияАудитБиологияБухгалтерияВоенное делоГенетикаГеографияГеологияГосударствоДомДругоеЖурналистика и СМИИзобретательствоИностранные языкиИнформатикаИскусствоИсторияКомпьютерыКулинарияКультураЛексикологияЛитератураЛогикаМаркетингМатематикаМашиностроениеМедицинаМенеджментМеталлы и СваркаМеханикаМузыкаНаселениеОбразованиеОхрана безопасности жизниОхрана ТрудаПедагогикаПолитикаПравоПриборостроениеПрограммированиеПроизводствоПромышленностьПсихологияРадиоРегилияСвязьСоциологияСпортСтандартизацияСтроительствоТехнологииТорговляТуризмФизикаФизиологияФилософияФинансыХимияХозяйствоЦеннообразованиеЧерчениеЭкологияЭконометрикаЭкономикаЭлектроникаЮриспунденкция

Which expression accurately defines the term congestion?

Читайте также:
  1. A message is sent to all hosts on a remote network. Which type of message is it:directed broadcast
  2. A Which sentence (1-3) best describes what it’s about?
  3. B. Which of the quotations do you agree with? Which of them can you argue? Motivate your point of view.
  4. Circle the word in each group which does not belong with the other words.
  5. CLASSIFICATION OF SET EXPRESSIONS
  6. COLLOQUIAL WORDS AND EXPRESSIONS
  7. Complete the fixed phrases in each space by choosing a word from the box which collocates with the words in bold.
  8. Complete the sentences by choosing appropriate words or expressions from the box. Translate the completed sentences into Ukrainian.
  9. Complete the sentences by filling in the gaps with the correct words or expressions.
  10. Define the morphemes the differential meaning of which helps to distinguish between words in the given sets.
  11. Define which words have been combined to form the following computer terms. Give their
  12. Ex. 34. Which houses would you like to live in? Why? Give arguments. Use the following criteria.

a method of limiting the impact of a hardware or software failure on the network
a set of techniques to manage the utilization of network resources
a state where the demand on the network resources exceeds the available capacity
a measure of the data carrying capacity of the network

 

 

CCNA 1 R&S ITN Chapter 2 v5.0 Exam Answers 2014

Thursday, February 20, 2014

CCNA 1 R&S ITN Chapter 2 v5.0 Exam Answers 2014

1.

Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same network can ping this gateway. What is a possible reason for this?

The default gateway address must be 192.168.10.1.
The ip default-gateway command has to be issued in the VLAN interface configuration mode.
The VLAN IP address and the default gateway IP address are not in the same network.
The no shutdown command was not issued for VLAN 1.
The local DNS server is not functioning correctly.

2.
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

Issue the reload command without saving the running configuration.
Close and reopen the terminal emulation software.
Delete the vlan.dat file and reboot the device.
Issue the copy startup-config running-config command.

3.
Why is it important to configure a hostname on a device?

to allow local access to the device through the console port
a Cisco router or switch only begins to operate when its hostname is set
to identify the device during remote access (SSH or telnet)
a hostname must be configured before any other parameters

4.
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Use the console port to locally access the switch from a serial or USB interface of the PC.
Use Secure Shell to remotely access the switch through the network​.
Use Telnet to remotely access the switch through the network.
Use the AUX port to locally access the switch from a serial or USB interface of the PC.

5.
What criterion must be followed in the design of an IPv4 addressing scheme for end devices?

Each local host should be assigned an IP address with a unique network component.
Each IP address must match the address that is assigned to the host by DNS.
Each IP address must be unique within the local network.
Each IP address needs to be compatible with the MAC address.

6.
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

AUX
SSH
Console
Telnet

7.
Which interface allows remote management of a Layer 2 switch?

the switch virtual interface
the console port interface
the AUX interface
the first Ethernet port interface

8.
What is a result of using the service password-encryption command on a Cisco network device?

All passwords in the configuration are not shown in clear text when viewing the configuration.
The command encrypts the banner message.
The command encrypts the enable mode password.
A network administrator who later logs into the device will be required to enter an administrator password in order to gain access to the Cisco device.

9.
Match the difinitions to their respective CLI hot keys and shortcuts.

Tab -> Completes abbreviated commands and parameters
Ctrl-R -> returns directly to the privileged EXEC mode
Up Arrow -> scrolls backwards through previously entered commands
Ctrl-Z -> cancels any command currently being entered and returns directly to privileged EXEC mode
Ctrl-C -> Redisplays, on a new line, the command currently being typed

10.
A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.)

What models of routers and switches require upgrades?
Do the routers and switches have enough RAM and flash memory for the proposed IOS versions?
What ports are installed on the routers and switches?
Are the devices on the same LAN?
What features are required for the devices?
Do the devices have enough NVRAM to store the IOS image?


1 | 2 | 3 | 4 | 5 | 6 | 7 | 8 | 9 | 10 | 11 | 12 | 13 | 14 | 15 | 16 | 17 | 18 | 19 | 20 | 21 | 22 | 23 | 24 | 25 | 26 | 27 | 28 | 29 | 30 | 31 | 32 | 33 | 34 | 35 | 36 | 37 | 38 | 39 | 40 | 41 |

Поиск по сайту:



Все материалы представленные на сайте исключительно с целью ознакомления читателями и не преследуют коммерческих целей или нарушение авторских прав. Студалл.Орг (0.004 сек.)