CCENT Study Guide by Lammle Todd

CCENT Study Guide by Lammle Todd

Author:Lammle, Todd [Lammle, Todd]
Language: eng
Format: epub
Publisher: Wiley
Published: 2013-08-06T14:00:00+00:00


The answers to these questions can be found in Appendix B, “Answers to Chapter Review Questions.”

1. Which of the following is a standards-based protocol that works much like CDP?

A. DHCP

B. LLDP

C. DDNS

D. SSTP

2. Which command can be used to determine a router’s capacity to generate debug output?

A. show version

B. show controllers

C. show processes cpu

D. show memory

3. You are troubleshooting a connectivity problem in your corporate network and want to isolate the problem. You suspect that a router on the route to an unreachable network is at fault. What IOS user exec command should you issue?

A. Router>ping

B. Router>trace

C. Router>show ip route

D. Router>show interface

E. Router>show cdp neighbors

4. You copy a configuration from a network host to a router’s RAM. The configuration looks correct, yet it is not working at all. What could the problem be?

A. You copied the wrong configuration into RAM.

B. You copied the configuration into flash memory instead.

C. The copy did not override the shutdown command in running-config.

D. The IOS became corrupted after the copy command was initiated.

5. In the following command, what does the IP address 10.10.10.254 refer to?

Router#config t Router(config)#interface fa0/0 Router(config-if)#ip helper-address 10.10.10.254

A. IP address of the ingress interface on the router

B. IP address of the egress interface on the router

C. IP address of the next hop on the path to the DHCP server

D. IP address of the DHCP server

6. The corporate office sends you a new router to connect, but upon connecting the console cable, you see that there is already a configuration on the router. What should be done before a new configuration is entered in the router?

A. RAM should be erased and the router restarted.

B. Flash should be erased and the router restarted.

C. NVRAM should be erased and the router restarted.

D. The new configuration should be entered and saved.

7. What command can you use to determine the IP address of a directly connected neighbor?

A. show cdp

B. show cdp neighbors

C. show cdp neighbors detail

D. show neighbor detail

8. According to the output, what interface does SW-2 use to connect to SW-3?

SW-3#sh cdp neighbors Capability Codes: R - Router, T - Trans Bridge, B - Source Route BridgeS - Switch, H - Host, I - IGMP, r - Repeater, P - Phone, D - Remote, C - CVTA, M - Two-port Mac Relay Device ID Local Intrfce Holdtme Capability Platform Port ID SW-1 Fas 0/1 170 S I WS-C3560- Fas 0/15 SW-1 Fas 0/2 170 S I WS-C3560- Fas 0/16 SW-2 Fas 0/5 162 S I WS-C3560- Fas 0/2

A. Fas 0/1

B. Fas 0/16

C. Fas 0/2

D. Fas 0/5

9. What command can you use to determine the IP address of a directly connected neighbor?

A. show cdp

B. show cdp neighbors

C. show cdp neighbors detail

D. show neighbor detail

10. You save the configuration on a router with the copy running-config startup-config command and reboot the router. The router, however, comes up with a blank configuration. What can the problem be?

A. You didn’t boot the router with the correct command.

B. NVRAM is corrupted.

C. The configuration register setting is incorrect.

D. The newly upgraded IOS is not compatible with the hardware of the router.

E. The configuration you saved is not compatible with the hardware.

11. If you want to have more than one Telnet session open at the same time, what keystroke combination would you use?

A. Tab+spacebar

B. Ctrl+X, then 6

C. Ctrl+Shift+X, then 6

D. Ctrl+Shift+6, then X

12. You are unsuccessful in telnetting into a remote device from your switch, but you could telnet to the router earlier.



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
OCA Java SE 8 Programmer I Certification Guide by Mala Gupta(9805)
Red Hat Certified Specialist in Services Management and Automation EX358 Exam Guide by Eric McLeroy(6319)
The KCNA Book by Nigel Poulton(4325)
Microsoft Security, Compliance, and Identity Fundamentals Exam Ref SC-900 by Dwayne Natwick(3687)
Designing and Implementing Microsoft Azure Networking Solutions by David Okeyode(3591)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart and Joe Anich(3543)
Microsoft Security Operations Analyst Exam Ref SC-200 Certification Guide by Trevor Stuart & Joe Anich(3463)
TCP IP by Todd Lammle(2997)
Microsoft Power BI Data Analyst Certification Guide by Ed Corcoran Orrin Edenfield(2926)
Unity Certified Programmer: Exam Guide by Philip Walker(2635)
MCSA Windows Server 2016 Study Guide: Exam 70-740 by William Panek(2531)
Networking A Beginner's Guide by Bruce Hallberg(2220)
Microsoft Power Platform Solution Architect's Handbook by Hugo Herrera(2048)
31 Days Before Your CompTIA A+ Exams (Shanette Luellen's Library) by Benjamin Patrick Conry(1869)
CompTIA A+ Practice Tests Core 1 (220-1101) and Core 2 (220-1102) by Ian Neil and Mark Birch(1804)
MCSA Windows Server 2016 Study Guide: Exam 70-741 by William Panek(1671)
PHP 7 Zend Certification Study Guide by Andrew Beak(1653)
Healthcare Information Security and Privacy (All-In-One) by Sean Murphy(1554)
CompTIA A+ Certification Guide (220-901 and 220-902) by Matthew Bennett(1531)
RHCSA & RHCE Red Hat Enterprise Linux 7: Training and Exam Preparation Guide (EX200 and EX300), Third Edition by Asghar Ghori(1494)