CCNA 1 Chapter 2 Exam
Ace your CCNA exams with these verified 2020 Q&As! Topics include kernel functions, secure remote access (SSH), Cisco switch setup, and more. Great for IT, networking, and cybersecurity prep.
Mason Bennett
Contributor
4.1
48
3 months ago
Preview (6 of 18)
Sign in to access the full document!
CCNA 1 (v5.1 + v6.0) Chapter 2 Exam Answers 2020 CCNA v5 + v6.0 Exam Answers
- 100% Full
1. What is the function of the kernel of an operating software?
, It provides a user interface that allows users to request a specific task.
« The kernel links the hardware drivers with the underlying electronics of a
computer.
• It is an application that allows the initial configuration of a Cisco device
, The kernel provisions hardware resources to meet software
requirements.
Related Posts
CCNA 4 Chapter fl Exam Answers 2020 (v5.0.3
+ v6.0) - Full 10D%
fl.4.1.1 The Inside Track Instructions Answers
8.3.1.4 Packet Tracer - Implementing a
Subnetted IPvfl Addressing Scheme Answers
1.0.12. Class Activity - Branching Oul Answers
2.5.1.1 Class Activity - PPP Validation Answers
8.3.3.A Lab - Configuring Basic Single-Area
OSPFv3 Answers
Scaling Networks vfl.O SsaN EIGRF Practice
Skills Assessment Answers
2. A network administrator needs to keep the user ID, password, and
session contents private when establishing remote CLI connectivity with a 3 1 1 C l a a a Activity - Tuning EIGRP Answers
Explain:
Operating systems function with a shelll, a kernel, and the hardware. The
shell interfaces with the users, allowing them to request specific tasks from
the device. The kernel provisions resources from the hardware to meet
software requirements. The hardware functions by using drivers and their
underlying electronics. The hardware represents the physical components of
the device.
switch to manage it. Which access method should be chosen? 11.10.2 Packet Tracer - Design and Implement
s VLSM Addressing Scheme - Physical Mode
Answers
CGNA 1 fTNvS Chapter 7: Check Your
Understanding Answers
. Telnet
, Console
. AUX
. SSH
Explain:
To be truly private a technician would use a Console connection however if
remote management is required SSH provides a secure method.
3. Which procedure is used to access a Cisco 2960 switch when performing
an initial configuration in a secure environment?
, Use Telnet to remotely access the switch through the network.
, Use the console port to locally access the switch from a serial or USB
interface of the PC.
* Use Secure Shell to remotely access the switch through the network.
. Use the AUX port to locally access the switch from a serial or USB interface Recent Comments
- 100% Full
1. What is the function of the kernel of an operating software?
, It provides a user interface that allows users to request a specific task.
« The kernel links the hardware drivers with the underlying electronics of a
computer.
• It is an application that allows the initial configuration of a Cisco device
, The kernel provisions hardware resources to meet software
requirements.
Related Posts
CCNA 4 Chapter fl Exam Answers 2020 (v5.0.3
+ v6.0) - Full 10D%
fl.4.1.1 The Inside Track Instructions Answers
8.3.1.4 Packet Tracer - Implementing a
Subnetted IPvfl Addressing Scheme Answers
1.0.12. Class Activity - Branching Oul Answers
2.5.1.1 Class Activity - PPP Validation Answers
8.3.3.A Lab - Configuring Basic Single-Area
OSPFv3 Answers
Scaling Networks vfl.O SsaN EIGRF Practice
Skills Assessment Answers
2. A network administrator needs to keep the user ID, password, and
session contents private when establishing remote CLI connectivity with a 3 1 1 C l a a a Activity - Tuning EIGRP Answers
Explain:
Operating systems function with a shelll, a kernel, and the hardware. The
shell interfaces with the users, allowing them to request specific tasks from
the device. The kernel provisions resources from the hardware to meet
software requirements. The hardware functions by using drivers and their
underlying electronics. The hardware represents the physical components of
the device.
switch to manage it. Which access method should be chosen? 11.10.2 Packet Tracer - Design and Implement
s VLSM Addressing Scheme - Physical Mode
Answers
CGNA 1 fTNvS Chapter 7: Check Your
Understanding Answers
. Telnet
, Console
. AUX
. SSH
Explain:
To be truly private a technician would use a Console connection however if
remote management is required SSH provides a secure method.
3. Which procedure is used to access a Cisco 2960 switch when performing
an initial configuration in a secure environment?
, Use Telnet to remotely access the switch through the network.
, Use the console port to locally access the switch from a serial or USB
interface of the PC.
* Use Secure Shell to remotely access the switch through the network.
. Use the AUX port to locally access the switch from a serial or USB interface Recent Comments
sea on ENSA (Version 7.D0) Final FT Ekllls
Assessment Exam (PTSA) Answers
of the PC.
Mini onCGNA 3 - ENSA Practice PT Skills
Assessment (FTSA) .Answers
leo on Linux Essentials - Chapter 04 Exam
Answers 2010 + FDFllle
Vy Vale on A technician is upgrading many PCs
used within Ihe company. Hew should the
lectwiclan dispose ol old RAM?
Explain:
Telnel ano SSH require active networking services to be configured on a
Cisco device before they become functional. Cisco switches do not contain
AUX ports.
a y on CCN.A 2 v? Modules 5 - a: Redundant
Networks Exam Answers
4. Which command or key combination allows a user Io relum to the
previous level in the command hierarchy?
, end
« exit
. Ctrl-Z
. Ctrl-C
Explain:
End and CTRL-Z return the user to the privileged EXEC mode. Ctrl-C ends a
c o m m a n d in process. The exit c o m m a n d returns the user lo the previous
level.
5. A router has a valid operating system and a configuration file stored in
NVRAM. The configuration file contains an enable secret password but no
console password. When the router boots up. which mode will display?
« global configuration mode
, setup mode
* privileged EXEC mode
, user EXEC mode
Explain:
If a Cisco iOS device has a valid iOS and a valid configuration file, it will boot
into user EXEC mode. A password will he required to enter privileged EXEC
mode.
6. Which two functions are provided to users by the context-sensitive help
feature of the Cisco IOS CLI? (Choose two.)
Assessment Exam (PTSA) Answers
of the PC.
Mini onCGNA 3 - ENSA Practice PT Skills
Assessment (FTSA) .Answers
leo on Linux Essentials - Chapter 04 Exam
Answers 2010 + FDFllle
Vy Vale on A technician is upgrading many PCs
used within Ihe company. Hew should the
lectwiclan dispose ol old RAM?
Explain:
Telnel ano SSH require active networking services to be configured on a
Cisco device before they become functional. Cisco switches do not contain
AUX ports.
a y on CCN.A 2 v? Modules 5 - a: Redundant
Networks Exam Answers
4. Which command or key combination allows a user Io relum to the
previous level in the command hierarchy?
, end
« exit
. Ctrl-Z
. Ctrl-C
Explain:
End and CTRL-Z return the user to the privileged EXEC mode. Ctrl-C ends a
c o m m a n d in process. The exit c o m m a n d returns the user lo the previous
level.
5. A router has a valid operating system and a configuration file stored in
NVRAM. The configuration file contains an enable secret password but no
console password. When the router boots up. which mode will display?
« global configuration mode
, setup mode
* privileged EXEC mode
, user EXEC mode
Explain:
If a Cisco iOS device has a valid iOS and a valid configuration file, it will boot
into user EXEC mode. A password will he required to enter privileged EXEC
mode.
6. Which two functions are provided to users by the context-sensitive help
feature of the Cisco IOS CLI? (Choose two.)
. providing an error message when a wrong command is submitled
, displaying a list of all available commands within the current mode
* allowing lhe user to complete the remainder of an abbreviated command with
the TAB key
. determining which option, keyword, or argument is available for the
entered command
, selecting the best command to accomplish a task
Explain:
Context-sensitive help provides the user with a list of commands and the
arguments associated with those commands wilhin the current mode of a
networking device. A syntax checker provides error checks on submitted
commands and the TAB key can be used for command completion if a partial
command is entered.
7. Which information does lhe show startup-config command display?
» the IOS image copied into RAM
« the bootstrap program in the ROM
, the contents of the current running configuration file in lhe RAM
, the contents of the saved configuration file in lhe NVRAM
Explain:
The show startup-config command displays the saved configuration located
in NVRAM. The show running -config command displays the contents of the
currently running configuration file located in RAM.
8. Why is it important to configure a hostname on a device?
, a Cisco router or switch only begins to operate when its hcslname is set
. a hostname must be configured before any other parameters
. Io identify the device during remote access (SSH or telnet)
, to allow local access to the device through the console port
Explain:
It is important to configure a hostname because various authentication
processes use the device hostname. Hostnames are helpful for
, displaying a list of all available commands within the current mode
* allowing lhe user to complete the remainder of an abbreviated command with
the TAB key
. determining which option, keyword, or argument is available for the
entered command
, selecting the best command to accomplish a task
Explain:
Context-sensitive help provides the user with a list of commands and the
arguments associated with those commands wilhin the current mode of a
networking device. A syntax checker provides error checks on submitted
commands and the TAB key can be used for command completion if a partial
command is entered.
7. Which information does lhe show startup-config command display?
» the IOS image copied into RAM
« the bootstrap program in the ROM
, the contents of the current running configuration file in lhe RAM
, the contents of the saved configuration file in lhe NVRAM
Explain:
The show startup-config command displays the saved configuration located
in NVRAM. The show running -config command displays the contents of the
currently running configuration file located in RAM.
8. Why is it important to configure a hostname on a device?
, a Cisco router or switch only begins to operate when its hcslname is set
. a hostname must be configured before any other parameters
. Io identify the device during remote access (SSH or telnet)
, to allow local access to the device through the console port
Explain:
It is important to configure a hostname because various authentication
processes use the device hostname. Hostnames are helpful for
Loading page 6...
3 more pages available. Scroll down to load them.
Preview Mode
Sign in to access the full document!
100%
Study Now!
XY-Copilot AI
Unlimited Access
Secure Payment
Instant Access
24/7 Support
Document Chat