Practice Exam 2 Flashcards

1
Q

Examine the NAT configuration shown in the exhibit. What is the problem with this NAT configuration?

interface gi0/0
ip address 10. 10.10.1 255.255.255.0
ip nat inside
!
i nterface gi0/1
ip address 10. 10.20.1 255.255.255.0
ip nat inside
!
interface serial 0/0
ip address 172.16.1 0.64 255.255.255.0
!
ip nat pool MYPOOL 172.16.10.1 172.16.10.1 prefix 24
ip nat inside source list 7 pool MYPOOL overload
access-list 7 permit 10.10.10.0 0.0.0.31
access-list 7 permit 10.10.20.0 0.0.0.31
_________

A

this configuration fails to define the outside interface.

Notice here we are doing a form of dynamic NAT. Also, we are overloading a single routable address. This means we are doing Port Address Translation or PAT. This configuration is fine, except it does not specify the outside NAT interface (serial 0/0).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In what phase of PPPoE is authentication performed?

A. Active Discovery Phase
B. Passive Discovery Phase
C. PPP Session Phase
D. Authentication Phase

A

C. PPP Session Phase

There are two phases of PPPoE. There is the Active Discovery Phase and the PPP Session Phase. Authentication takes place in the PPP Session Phase.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The user at the PC shown in the figure that follows is copying a file from the Server with a program that uses a connectionless transport protocol.
Which protocols on the left match up to the layers on the right regarding the encapsulation done by the PC? (Not all protocols are used.)

A

Application—TFTP; Transport—UDP; Internet—IP; Network Access—Ethernet.

Here the connectionless application if TFTP. UDP is the connectionless transport protocol used by TFTP. IP is the Internet layer protocol, while Ethernet is used at the Network Access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What command can you use to see the BGP peers from your local device?

A. show ip bgp summary
B. show ip bgp neighbors
C. show bgp peers
D. show bgp adjacencies

A

A. show ip bgp summary

Use the show ip bgp summary command to see the peers with your local device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the effect of the no login command under the virtual terminal lines?

A. It prevents log in to the device using the VTY lines.
B. It redirects login to the console port.
C. It triggers AAA only access to the VTY lines.
D. It does not require login on the VTY lines.

A

D. It does not require login on the VTY lines.

The no login command can be very confusing. When it is issued, it indicates that the password should not be checked upon login, so it does not prevent login, but actually makes login possible without security.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Examine the configuration shown below. Why is the configuration producing an error when pasted into the CLI?

Current configuration : 2945 bytes
!
!
v ersion 15.6
service time stamps debug datetime msec
service timestamps log datetime msec
no service password-encryption
!
h ostname Router-A
!
b oot-start-marker
boot-end-marker
!
n o aaa new-model
!
m mi polling-interval 60
no mmi auto-configure
no mmi pvc
mmi snmp-t imeout 180
!
!
!
i p cef
no ipv 6 cef
!
11/6/2018 https://techbus.safaribooksonline.com/print?xmlid=9780134645292%2Fapp04_html
https://techbus.safaribooksonline.com/print?xmlid=9780134645292%2Fapp04_html 3/17
multilink bundle-name authenticated
!
r edundancy
!
!
!
i nterface GigabitEthernet0/0
no ip address
shutdown
duplex a uto
speed auto
media-type rj45
!
i nterface GigabitEthernet0/1
ip address 172.16.1.64 255. 255.255.224
duplex auto
speed auto
media-type rj45
!
i p forward-protocol nd
!
!
n o ip http server
no ip http secure -server
ip route 10.10.10.0 255. 255.255.0 172.16.1.2

!
!
!
a ccess-list 101 permit ip 10.10.0.0 0.0.255.255 any
access-list 101 deny ip host 10.10.10.1 any
access-list 101 deny ip any any log
!
c ontrol-plane
!
!
l ine con 0
line aux 0
line vty 0 4
password ci sco
no login
transpor t input telnet ssh
!
n o scheduler allocate
!
end

A. Because there is no enable password set
B. Because the hostname is not legal
C. The transport input command lists both Telnet and SSH
D. Because of a bad IP address and mask combination

A

D. Because of a bad IP address and mask combination

A valid IP address can’t have all zeros for the host portion, which is the problem with this attempted configuration. As a side note, on some Cisco devices, hostnames must begin with a letter, end with a letter or digit, and have as interior characters only letters, digits, and hyphens. Names must be 63 characters or fewer. In this example, the hostname was not the problem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What Cisco technology features the use of a Forwarding Information Base?

A. CEF
B. ARP
C. VTP
D. IPv6

A

A. CEF

Cisco Express Forwarding enhances the speed of routing operations and uses a Forwarding Information Base in its operation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What QoS technology is often used for congestion management in VoIP environments?

A. LLQ
B. CBWFQ
C. WFQ
D. FIFO

A

A. LLQ

LLQ is the most common congestion management mechanism in VoIP environments today. This provides a strict priority queue for voice traffic alongside CBWFQ for other traffic forms.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Where is the full compressed IOS image typically stored on a Cisco router?

A. TPM
B. RAM
C. NVRAM
D. Flash

A

D. Flash

Flash memory is like the hard drive on a PC, it is typically where the operating system is stored.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is true regarding a network device that receives the packet as shown in the protocol analyzer output that follows? (Choose two.)

A. A bridge would forward the packet based on the Layer 1 destination address
B. A hub would forward the packet based on the Layer 2 destination address
C. A switch would forward the frame based on the Layer 2 destination address
D. A router would forward the packet based on the Layer 2 source address
E. A router would forward the packet based on the Layer 3 source address
F. A router would forward the packet based on the Layer 3 destination address

A

C. A switch would forward the frame based on the Layer 2 destination address
F. A router would forward the packet based on the Layer 3 destination address

Switches forward based on the destination MAC (Layer 2) address, whereas routers forward based on the destination Layer 3 address (the IP address).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What protocol does Ping use?

A. TCP
B. ICMP
C. UDP
D. ARP

A

B. ICMP

Ping is a troubleshooting tool that relies upon ICMP.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Map the layers on the left to the protocols on the right. Not all layers are used, and some layers may be used more than once.

A

CDP—Datalink; TCP—Transport; PPP—Datalink; SMTP—Application; Serial—Physical; IP—Network. Be prepared to map technologies to the correct layer of the OSI model, as done here.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the equivalent of the OSI presentation layer in the TCP/IP model?

A. Internet layer
B. Network access layer
C. Transport layer
D. Application layer

A

D. Application layer

The presentation layer of the OSI model is rolled into the Application layer of the TCP/IP model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What transport layer protocol provides sequencing and synchronization?

A. HTTP
B. TCP
C. ICMP
D. UDP

A

B. TCP

TCP at the Transport layer provides connection oriented, reliable features. This includes the sequencing and synchronization of packets.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What device protects “internal” networks from “external” networks?

A. WLC
B. Firewall
C. AP
D. Layer 2 Switch

A

B. Firewall

Firewalls are specialized devices that protect internal networks from external networks. Keep in mind, they can be software implementations or hardware appliances. These days they can even be virtual.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What layer of the classic Cisco network model is typically not collapsed in a simplified two-layer design?

A. Access
B. Internet
C. Core
D. Distribution

A

A. Access

A collapsed core design is one where the distribution layer meshes into the core. You often see this in smaller networks, where the complexity of a three-layer design just really is not needed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What topology provides the most overhead in a network design?

A. Bus
B. Full mesh
C. Star
D. Partial mesh

A

B. Full mesh

The mesh topology is often implemented as full or partial. The full mesh provides the best redundancy, but it typically comes at the cost of complexity and the cost of many links.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the standard maximum frame size in a typical Ethernet network?

A. 1500
B. 1600
C. 1900
D. 9000

A

A. 1500

The standard frame size and MTU is 1500 bytes in Ethernet networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In the network depicted, the user at PC1 has asked about which program to use that will copy a file from the server to PC1 using a reliable Layer 4 transport protocol. Which of the following would meet both requirements? (Choose two.)

A. OSPF
B. TFTP
C. FTP
D. SCP
E. DNS

A

C. FTP
D. SCP

OSPF is a routing protocol and not a file transfer protocol used in the network. TFTP uses UDP and does not provide reliability. Finally, DNS is used for name resolution and not file transfer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What happens to a port protected with BPDU Guard when there is a violation?

A. Error Disabled
B. Shutdown
C. Admin Disabled
D. Paused

A

A. Error Disabled

A BPDU-Guard–protected port enters an error-disabled state when a violation is detected.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What technology is used in order to allow a switch port to carry the traffic of multiple Data VLANs from one device to another in a Cisco network?

A. VLAN hopping
B. Trunking
C. Port Security
D. VTP

A

B. Trunking

Trunking, specifically 802.1Q, permits the transport of multiple Data VLANs between devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Examine the MAC addresses on SwitchA and SwitchB:

SwitchA: c001.3412.9301
SwitchB: 0019.e728.8101

Which switch becomes the root bridge if the default STP priority values are in place?

A. SwitchA
B. SwitchB
C. None of these switches
D. Both devices

A

B. SwitchB

The lower MAC address wins in the case of equal priority values. In this case, the lower MAC address belongs to SwitchB. Remember hex values of 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What port security approach is considered a mix of dynamic and static configuration?

A. Trunking
B. Violation null
C. Sticky learning
D. Blocked learning

A

C. Sticky learning

Port security sticky learning means the port will initially dynamically learn the MAC address and added to the running configuration. Then this MAC address can be saved (using the command copy running-config startup-config) in the startup configuration as a static MAC address assignment for port security when the switch reboots.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Your junior administrator is examining a Cisco routing table and asks you what is the meaning of the D he sees in routing table entries. What does this indicate?

A. OSPF
B. BGP
C. RIP
D. EIGRP

A

D. EIGRP

EIGRP routes appear in the routing table with a D designation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the prefix used for IPv6 Link Local addresses?

A. fe80::/10
B. fec0::/10
C. fe80::/8
D. fec0::/8

A

A. fe80::/10

fe80::/10 is the prefix reserved for link local addressing in IPv6.

26
Q

Examine the command shown here, what is the purpose of the last entry in this command (121)?

ip route 10.10.10.0 255.255.255.0 172.16.1.1 121

A. This is a sequence number.
B. This is the metric value for the route entry.
C. This is an administrative distance value to create a floating static route.
D. This is a weight value.

A

C. This is an administrative distance value to create a floating static route.

Administrative distance is added to the ip route command in order to create floating static routes.

27
Q

Which of the following is used by an IPv6 multicast address?

A. f080::/10
B. ff00::/8
C. fc00::/8
D. f008::/10

A

B. ff00::/8

Multicast in IPv6 uses a FF00::/8 prefix.

28
Q

What networking device provides instructions to APs in the modern network?

A. Router
B. Firewall
C. Switch
D. WLC

A

D. WLC

The Wireless LAN Controller is the device in the modern network that controls and manages Access Points.

29
Q

Which of the following does not need to match when configuring your OSPF version 2 peering?

A. The local process ID
B. The hello and dead timers
C. The area ID
D. Authentication

A

A. The local process ID

Many values must match in order for an OSPF peering to form. The local process ID is not one of them.

30
Q

What command enables you to see your IPv6 EIGRP neighbors?

A. show eigrp neighbor ipv6
B. show eigrp ipv6 neighbor
C. show ipv6 eigrp neighbor
D. show ipv6 eigrp peering

A

C. show ipv6 eigrp neighbor

The show ipv6 eigrp neighbor command permits you to see the local peerings.

31
Q

In the network depicted, the Server is sending HTTP content back to the PC that requested it. Which of the following is true as the packets are forwarded over the network?

A. The Bridges and Switches use Ethernet addresses to make forwarding decisions
B. The Hubs, Bridges, and Switches use Ethernet addresses to make forwarding decisions
C. The Routers, Bridges, and Switches use Ethernet addresses to make forwarding decisions
D. The Hubs, Routers, Bridges, and Switches use Ethernet addresses to make forwarding decisions

A

A. The Bridges and Switches use Ethernet addresses to make forwarding decisions

Switches and Bridges use Layer 2 Ethernet addresses to forward traffic.

32
Q

Based on the network depicted, provide the complete syntax for a standard ACL for Router 2 G2/0 that permits traffic sourced from the PC but denies all other traffic. This ACL must use the number 10, and must use the most efficient syntax possible.

_________

A

The correct syntax:

access-list 10 permit host 172.16.0.50

access-list 10 deny any

interface gi2/0

ip access-group 10 out

33
Q

What may happen to a GRE tunnel if the router has learned the destination IP address for the destination of the tunnel interface through the tunnel itself?

A. The tunnel interface comes up.
B. The tunnel interface goes down.
C. There is no impact on the tunnel interface.
D. The tunnel interface is not exported by BGP, but is available to IGPs.

A

B. The tunnel interface goes down.

The tunnel interface will go down if GRE has learned the tunnel destination IP address for the tunnel interface through the tunnel itself. This can be a recursive routing problem.

34
Q

Which of the following is a Cisco FHRP protocol?

A. PPPoE
B. GRE
C. HSRP
D. STP

A

C. HSRP

The Cisco FHRP protocol is HSRP.

35
Q
A
36
Q

Your junior admin notes that when he just performed a Ping, one of the packets failed. What is the most likely cause of the following results?

Router1# ping 10.255.0.126 Type escape sequence to ab ort.
Sending 5, 100-byte ICMP Echos to 10.255.0.126, timeout is 2
seconds:
.!!!!
Success rate is 80 percent (4/5), round-trip min/avg/max = 35/72/76 ms

A. Load balancing, with one of the next hops being unavailable
B. ARP resolution
C. Half-duplex operation
D. 10Mbps being used instead of FastEthernet or GigabitEthernet

A

B. ARP resolution

Ping packets might fail as a result of the initial ARP that must be performed.

37
Q

Router A is assigning IP addresses to hosts in VLAN 10 as shown in the depicted network that follows. The user at PC-10 powers up their computer, and checks www.cnn.com for news. What is the correct sequence of the first four protocols used by PC-10 when it powers up?

_________

A

DNS, DHCP, NTP, HSRP—1st—DHCP; 2nd—ARP; 3rd—DNS; 4th—HTTP.

This system broadcasts for its local DHCP server. It then performs ARP for its default gateway. Finally, this device will use DNS for domain name resolution and HTTP to access the Web site.

38
Q

Given the following address and mask 172.16.10.1 255.255.248.0, what is the broadcast address for the subnet?

A. 172.16.15.255
B. 172.16.8.0
C. 172.16.16.255
D. 172.16.255.255

A

A. 172.16.15.255

Here the increment is on 8 as there are 5 bits of subnetting used. The host range of this subnet is 172.16.8.1 to 172.16.15.254.

39
Q

What is the authentication method found in many RADIUS environments today?

A. EAP
B. PAP
C. TELNET
D. MD5

A

A. EAP

EAP is an authentication framework used in many RADIUS environments.

40
Q

What is the term for an API that communicates from a network management station to the SDN controller?

A. West
B. East
C. Southbound
D. Northbound

A

D. Northbound

The Northbound APIs are used to communicate between those configuring the network and the SDN controller. The southbound APIs represent the communications from the controller to the actual network devices themselves.

41
Q

What is the purpose of the following command: service timestamps log datetime msec?

A. To prevent attackers from manipulating the time in syslog messages
B. This command is not valid
C. To mark syslog messages with the data and time, including the millisecond
D. To indicate the time of transference for syslog messages to the server

A

C. To mark syslog messages with the data and time, including the millisecond

This command ensures that syslog messages are timestamped to the msec.

42
Q

What command does a client use to enable stateless auto configuration of IPv6 address information on an interface?

A. ipv6 address autoconfig
B. ipv6 address dhcp
C. ipv6 address enable
D. ipv6 enable

A

A. ipv6 address autoconfig

The ipv6 address autoconfig command is used on the client.

43
Q

RIP version 2 is properly configured and working on both routers shown in the depicted network. The following was added to Router X: ip route 10.255.0.128 255.255.255.224 10.255.0.75 89. What will be the result?

A. The static route will have an administrative distance that is better than RIP.
B. There will be a Layer 2 loop.
C. Router X will attempt to send packets destined to subnet 10.255.0.128/27 to PC 1.
D. This will cause a broadcast storm.

A

A. The static route will have an administrative distance that is better than RIP.

Here the AD of the static route (89) is less (better) than the AD of RIP which is 120.

44
Q

Examine the topology shown below. PC1 is sending an HTTP packet to Server 1. What is true about this traffic as it is forwarded through Switch C? (Choose three.)

A. Source physical address will be 0000.3333.3333.
B. Source Layer 2 address will be 00:00:11:11:11:11.
C. Source address will be 10.255.0.92.
D. Destination physical address will be 00:00:66:66:66:66.
E. Destination address will be 0000.4444.4444.

A

A. Source physical address will be 0000.3333.3333.
C. Source address will be 10.255.0.92.
E. Destination address will be 0000.4444.4444.

Without NAT, the source and destination IP addresses never change. The Layer 2 header information as the frame goes through Switch C will show a source MAC address of Router X and a destination MAC address of Router Y.

45
Q

The Switch MAC address table is shown below the topology here. PC1’s ARP cache is empty, and the user at PC 1 uses Ping to test the IP address reachability of Sever 1. Which of the following is true when the user presses enter?

A. The first frame will be sent out port 0/6 only.
B. The switch will add the printer’s MAC address to the MAC address table.
C. The first frame from PC1 will be forwarded out all ports, except 0/7.
D. The reply to the Ping request will cause the server’s MAC address to be added to the table.
E. The first frame will have a destination MAC address of Server 1.

A

C. The first frame from PC1 will be forwarded out all ports, except 0/7.

The first frame would be an ARP request, sent as a broadcast and it is sent out all ports for that VLAN except the switch port where the original frame entered the switch.

46
Q

A host runs the command ipconfig on their local system. The results are as follows:

Ethernet adapter:
Connection-spe cific DNS Suffix . :
IPv4 Address. . . . . . . . . . . : 172.18.62.255
Subnet Mask . . . . . . . . . . . : 255.255.248.0
Default Gateway . . . . . . . . . : 172.18.63.254

Which of the following are true? (Choose two.)

A. The broadcast address for the host’s subnet is 172.18.71.255.
B. The network the host is connected to is a Class B private address.
C. The subnet the host is connected to could support up to 2048 hosts.
D. The host with an IP of 172.18.64.5 would be on the same network as the host in the question.
E. The host address is on the 172.18.56.0/21 network.

A

B. The network the host is connected to is a Class B private address.
E. The host address is on the 172.18.56.0/21 network.

This host is on the 172.18.56.0/21 network with a 172.18.56.1—172.18.63.254 host range.

47
Q

Which of the following are valid host addresses when using a mask of 255.255.248.0? (Choose three.)

A. 34.45.56.0
B. 40.50.60.0
C. 50.60.70.255
D. 51.61.71.255
E. 60.70.80.0

F. 60.70.80.255

A

B. 40.50.60.0
C. 50.60.70.255

F. 60.70.80.255

Host addresses can’t have all 1s or all 0s for the host portion of their addresses. Below is the breakdown for the relevant networks, given this mask.
NOTE: 255.255.248.0 or /21

48
Q

Refer to the depicted network. All the switches and R1 have had their startup configurations deleted and then were rebooted before saving to NVRAM. These devices are now running in their default configuration. Which of the following are true? (Choose three.)

A. Clients shown in the diagram as being on VLANs 10, 20, and 30 will now all be on the same VLAN.
B. SW1 will see CDP neighbors on at least three interfaces.
C. The commands show protocols, show ip interface, show interface, or show ip interface brief can be used to confirm that R1
G0/0 is up/up.
D. If the command: ip address 10.0.0.1 /24 was added for G0/0 on R1, SW1 would learn that IP address within 60 seconds.
E. SW2 will see two CDP neighbors.

A

A. Clients shown in the diagram as being on VLANs 10, 20, and 30 will now all be on the same VLAN.
B. SW1 will see CDP neighbors on at least three interfaces.
E. SW2 will see two CDP neighbors.

The clients are now on the same VLAN, the default VLAN if 1. SW1 will see SW4, SW2, and R1 via CDP. SW2 will see SW1 and SW3 via CDP.

49
Q

Provide the switch configuration to meet these requirements:

Create a user account BOB with a password of ToUgH1!23; this password should be stored using MD5.
Telnet should be disabled on the switch.
SSH should be enabled on the switch.
The local user accounts should be used to authenticate on the VTY lines.
Existing and future plain text passwords should be encrypted.
The password to get into privileged mode should be iTsMe@HeRe$, and it should be stored using MD5.
The management interface should use the default VLAN and have the IP address of 10.20.30.75/27.
The default gateway should be set to 10.20.30.94.

_________

A

Here is the solution configuration:

username BOB secret ToUgH1!23
!
l ine vty 0 15
transport inp ut ssh
login local
!
service password-encryption
!
enable secret iTsMe@HeRe$
!
interface vlan 1
ip address 10.20 .30.75 255.255.255.224
!
ip default-gateway 10.20.30.94

50
Q

CSMA/CD technology is critical for what type of Ethernet network?

A. Full mesh
B. Partial mesh
C. Star
D. Half-duplex

A

D. Half-duplex

CSMA/CD allows devices to react properly when collisions occur on half-duplex network connections.

51
Q

Your VoIP users are complaining about their Cisco IP Phones not functioning properly. There have been changes to the local switch that connects these users. What is the most likely problem?

A. CDP was disabled.
B. Telnet was no longer permitted.
C. Service Password Encryption was used.
D. SSH is now mandatory.

A

A. CDP was disabled.

Cisco IP Phones use CDP in order to communicate key information with the switch.

52
Q

How is CDP carried on the network?

A. Using 802.1Q messages
B. Using VTP messages
C. Using Layer 2
D. Using Layer 1

A

C. Using Layer 2

CDP is transported directly over Layer 2. This ensures devices can see each other.

53
Q

What is the default administrative distance of iBGP?

A. 20
B. 90
C. 120
D. 200

A

D. 200

iBGP is not considered compared to IGPs for distribution of prefixes inside an AS. As a result, it has a very high admin distance of 200.

54
Q

What two options exist for the next-hop information in a static route? (Choose two.)

A. Specifying the next-hop IP address
B. Specifying the next-hop MAC address
C. Specifying the next-hop CDP ID
D. Specifying the exit interface

A

A. Specifying the next-hop IP address
D. Specifying the exit interface

The next-hop property can take an IP address of the next router or the local exit interface of the sending router.

55
Q

What is the default lease duration for a Cisco DHCP server?

A. 1 hour
B. 1 day
C. 1 week
D. 1 month

A

B. 1 day

The default lease duration is one day.

56
Q

How do you configure a Cisco router to act as the reference time source on a network?

A. Use the ntp server command.
B. Use the ntp master command.
C. Use the ntp source command.
D. Use the ntp clock command.

A

B. Use the ntp master command.

The ntp master command sets the local device as an authoritative time source.

57
Q

What is the default privilege level for a local user account created with the username command?

A. 0
B. 1
C. 8
D. 15

A

B. 1

The default privilege level is very low—it is 1. This permits user mode access only.

58
Q

What VTY line command causes the local username database to be checked for remote access?

A. login
B. local
C. login local
D. aaa login local

A

C. login local

login local command ensures the use of the local user accounts database on the device when connecting to the VTY lines.

59
Q

What command do you use in order to upgrade an IOS image on your local device with an image from a TFTP server?

A. move
B. copy
C. tftp server
D. upgrade

A

B. copy

The copy command allows the transfer of files and images.

60
Q

How many probes does Ping send by default?

A. 1
B. 2
C. 3
D. 5

A

D. 5

The Ping utility sends five packets by default.