Sie sind auf Seite 1von 12

c c

   c  


5.1.1.1

1. WHAT FEATURES DOES AN ISR COMBINE?

ANS. THE FEATURES COMBINED IN AN ISR

1.p ROUTING AND LAN SWITCHING FUNCTIONS


2.p SECURITY
3.p VOICE AND WAN CONNECTIVITY

2. THE ISR IS IDEAL FOR WHAT TYPE OF BUSINESSES?

ANS. ISR IS IDEAL FOR SMALL TO MEDIUM SIZED BUSINESSES AND FOR ISP MANAGED
CUSTOMERS.

4.p WHAT DOES THE (IOS) SOFTWARE FEATUES ENABLE A CISCO DEVICE TO DO?
ANS. IOS SOFTWARE PROVIDES FEATUES THAT ENABLE A CISCO DEVICE TO SEND AND
RECEIVE NETWORK TRAFFIC USINGA WIRED OR WIRELESS NETWORK. CISCO IOS SOFTWARE
IS OFFERED TO CUSTOMERS IN MODULES CALLED IMAGES.. THESE IMAGES SUPPORT
VARIOUS FEATURES FOR BUSINESSES OF EVERY SIZE..
5.p WHAT IS AN IP BASED IMAGE?
ANS. THE ENTRY LEVEL CISCO IOS SOFTWARE IMAGE IS CALLED THE › ›. THE
› › SOFTWARE SUPPORTS SMALL TO MEDIUM SIZED BUSINESSES AND
SUPPORTS ROUTING BETWEEN NETWORKS.
6.p WHAT DOES THE CISCO ›  SOFTWARE SUPPORT?
ANS. SUPPORTS SMALL TO MEDIUM-SIZED BUSINESSES ROUTING BETWEEN NETWORKS.
7.p WHAT FUNCTIONALITY IS ADDED BY INSTALLING THE  
 ››
ANS.  
 ›› PROVIDES ADVANCED SECURITY FEATURES, SUCH AS
PRIVATE NETWORKING AND FIREWALLS.
8.p WHAT IS SHIPPED WITH EACH CISCO DEVICE?
ANS. EACH DEVICE IS SHIPPED WITH CABLES AND DOCUMENTATION NEEDED TO POWER
UP THE DEVICE AND BEGIN THE INSTALLATION.
9.p WHAT ARE THREE TOOLS REQUIRED TO INSTALL A NEW CISCO DEVICE?
ANS. THREE TOOLS REQUIRED:
1.p CABLE TIES PC WITH TERMINAL EMULATION PROGRAM
2.p NUMBER 2 PHILIP SCREWDRIVER
3.p CABLES FOR WAN INTERFACES, LAN INTERFACES AND USB INTERFACES.
10.pWHAT SHOULD YOU READ BEFORE BEGINNING ANY EQUIPMENT INSTALLATION?
ANS. BEFORE ATTEMPTING ANY INSTALLATION BE SURE TO READ THE < ›   ›
pWHAT ARE THE SIX STEPS TO PERFORM A POWER UP PROCEDURE ON AN ISR 1841?
ANS. THE STEPS:
1.p Securely mount and ground the device
2.p Seat the external compact flash card
3.p Connect the power cable
4.p Configure the terminal emulation software on the pc and connect the pc to
the console port.
5.p Turn on the router
6.p Observe the startup messages on the pc as the router boots up.
12.pLIST THE 3 STAGES OF THE ROUTER BOOTUP PROCESS.
ANS. THE THREE STAGES OF THE BOOTUP:
1.p PERFORM POWER-ON SELF TEST (POST) AND LOAD THE BOOTSTRAP
PROGRAM. POST IS USED TO TEST ROUTER HARDWARE
2.p LOCATE AND LOAD THE CISCO IOS SOFTWARE
3.p LOCATE AND EXECUTE THE STARTUP CONFIGURATION FILE OR ENTER SETUP
MODE. TO BEGIN THE CONFIGRUATION PROCESS.
13.pWHAT ARE 3 PLACES WHERE IOS CISCO FILES CAN BE LOCATED?
ANS. THREE PLACES THE FILES CAN BE LOCATED:
1.p FLASH MEMORY
2.p TFTP SERVER
3.p ANOTHER LOCATION INDICATED IN STARTUP CONFIGURATION FILE.
14.pWHAT HAPPENS IF A CONFIG FILE IS NOT FOUND?
ANS. THE ROUTER PROMPTS USER TO ENTER SETUP MODE.,TO BEGIN THE CONFIGURATION
PROCESS.
15.pWHAT HAPPENS IF THE CONFIG FILE IS FOUND?
ANS. IT IS COPIED INTO RAM AND PROMPT CONTAINING THE HOST NAME IS DISPLAYED.
16.pWHAT IS THE STARTUP CONFIGURATION?
ANS. THE STARTUP CONFIGURATION FILE IS THE SAVED CONFIGURATION FILE THAT SETS
THE PROPERTIES OF THE DEVICE EACH TIME THE DEVICE IS POWERED UP. THIS FILE IS
STORED IN NON VOLATILE RAM.
17.pWHERE IS THE STARTUP CONFIGURATION FILE STORED?
ANS THE STARTUP CONFIGURATION FILE IS STORED IN NON VOLATILE RAM.
18.pWHAT HAPPENS TO THE FILES IN NVRAM WHEN POWER TO THE DEVICE IS POWERED OFF?
ANS. WHEN THE DEVICE IS POWERED OFF THE CONFIG FILES ARE LOST.
19.pWHAT DOES A CISCO ROUTER DO WHEN IT IS POWERED ON?
ANS. WHEN THE ROUTER IS FIRST POWERED ON IT LOADS THE CISCO IOS SOFTWARE TO
WORKING MEMORY, OR RAM.
20.pWHAT IS THE SECOND THING A CISCO ROUTER WILL DO WHEN POWERED UP?
ANS. THE STARTUP CONFIGURATION FILE IS COPIED FROM NVRAM TO RAM.
21.pWHAT DOES THE TERM RUNNING CONFIGURATION REFER TO?
ANS. RUNNING CONFIG REFERS TO THE CURRENT CONFIGURATION RUNNING IN RAM ON
THE DEVICE. THIS FILE CONAINS THE COMMANDS USED TO DETERMINE HOW THE DEVICE
OPERATES ON THE NETWORK. THE RUNNING CONFIGURATION FILES IS STORED IN THE
WORKING MEMORY OF THE DEVICE.
22.pWHAT HAPPENS TO THE INFORMATION ON RAM OR RUNNING CONFIGURATION WHEN IT
IS TURNED OFF?
ANS. THE RUNNING CONFIGURATION IS LOST EACH TIME THE DEVICE IS SHUT DOWN.
23.pIF CHANGES ARE MADE TO THE RUNNING CONFIGURATION WHAT IS NECESSARY IN ORDER
FOR THE CHANGES TO BE SAVED WHEN THE DEVICE IS POWERED OFF?
ANS. IT IS NECESSARY TO MANUALLY COPY THE RUNNING CONFIGURATION TO THE
STARTUP CONFIGURATION FILE. COPY RUNNING CONFIGURATION STARTUP CONFIG OR
COPY RUN START SAVES THE RUNNING CONFIG TO THE STARTUP CONFIG FILE.
24.pWHAT COMMAND IS USED TO SAVE THE ROUTER͛S RUNNING CONFIGURATION TO THE
STARTUP CONFIGURATION ?
ANS. COPY RUNNING-CONFIG STARTUP-CONFIG
25.pWHAT COMMAND CAN BE USED TO TROUBLESHOOT SOME OF THE BASIC HARDWARE AND
SOFTWARE COMPONENTS USED DURING THE BOOTUP PROCESS?
ANS.   ›

.
26.pWHAT DOES THE CONFIGURATION REGISTER SETTING OF j jTELL THE ROUTER TO DO?
ANS.0X2102 IS THE FACTORY DEFAULT SETTING FOR THE CONFIGURATION REGISTER. THIS
VALUE INDICATES T HAT THE ROUTER ATTEMPTS TO LOAD A CISCO SOFTWARE IMAGE
FROM FLASH AND LOADS THE STARTUP CONFIGURATION FILE INTO VNVRAM
27.pIF THERE IS A SECOND VALUE IN PARENTHESIS WHAT DOES IT DENOTE?
ANS. A SECOND VALUE DENOTES THE CONFIGURATION REGISTER VALUE TO B E USED
DURING THE NEXT RELOAD OF THE ROUTER.
28.pLIST THREE REASONS THAT A ROUTER MAY FAIL TO BOOTUP PROPERLY.
ANS. REASONS THE ROUTER MIGHT BOOTUP IMPROPERLY:
1.p CORRUPT OF MISSING IOS FILE
2.p INCORRECT LOCATION FOR CISCO IMAGE
3.p INADEQUATE MEMORY TO LOAD CISCO IMAGE.
29.pIF THE ROUTER FAILS TO BOOT THE IOS HOW DOES IT BOOT UP?
ANS. IF THE ROUTER FAILS TO BOOT THE IOS IT THEN BOOTS UP IN ROM MONITOR.
ROMmon SOFTWARE IS A SIMPLE COMMAND SET STORED IN READ ONLY MEMORY.
30.pWHEN THE ROUTER BOOTS UP TO ROMmon MODE WHAT IS ONE OF THE FIRST STEPS IN
TROUBLESHOOTING?
ANS. ONE OF THE FIRST STEPS IN TROUBLESHOOTING IS TO LOOK IN FLASH MEMORY FOR A
VALID IMAGE USING THE DIR FLASH: COMMAND IF AN IMAGE IS LOCATED ATTEMPT TO
BOOT THE IMAGE WITH THE BOOT FLASH:COMMAND.
31.pIF THE ROUTER BOOTS PROPERLY WITH THE i
  COMMAND, WHAT ARE TWO
POSSIBLE R EASONS WHY THE CISCO IOS IMAGE DID NOT LOAD FROM FLASH INITIALLY?
ANS. FIRST USE THE SHOW VERSION VERSION COMMAND TO CHECK THE CONFIGURATION
REGISTER TO ENSURE T HAT IT IS CONFIGURED FOR THE DEFAULT BOOT SEQUENCE. IF THE
CONFIGURATION REGISTER VALUE IS CORRECT USE THE SHOW STARTUP-CONFIG
COMMAND TO SEE IF THERE IS A BOOTSYSTEM COMMAND THAT INSTRUCTS THE ROUTER
TO USE A DIFFERENT LOCATION FOR THE CISCO IOS IMAGE.
32.pWHAT DOES AN OUT-OF-BAND MANAGEMENT CONNECTION REQUIRE?
ANS. OUT-OF-BAND MANAGEMENT REQUIRES A COMPUTER TO BE DIRECTLY CONNECTED
TO THE CONSOLE PORT OR AUXILLARY PORT (AUX) OF THE NETWORK DEVICE BEING
CONFIGURED. THIS TYPE OF CONNECTION DOES NOT REQURE THE LOCAL NETWORK
CONNECTIONS ON THE DEVICE TO BE ACTIVE
33.pWHY DO TECHNICIANS USE  
i     TO INITIALLY CONFIGURE A
NETWORK DEVICE?
ANS. THEY USE  
i     TO INITIALLY CONFIGURE A NETWORK
DEVICE BECAUSE UNTIL PROPERLY CONFIGURED THE DEVICE CANNOT PARTICIPATE IN THE
NETWORK.  
i     IS ALSO USEFUL WHEN THE NETWORK
CONNECTIVITY IS NOT FUNCTIONING CORRECTLY AND THE DEVICE CANNOT BE REACHED
OVER THE NETWORK. PERFORMING  
i  TASKS REQUIRES A TERMINAL
EMULATION CLIENT INSTALLED ON THE PC.
34.pWHEN IS OUT-OF-BAND MANAGEMENT USEFUL?
ANS@ 
i     IS USEFUL WHEN THE NETWORK CONNECTIVITY IS
NOT FUNCTIONING CORRECTLY AND THE DEVICE CANNOT BE REACHED OVER THE
NETWORK.
35.pWHEN IS IN-BAND MANAGEMENT USED?
ANS. IN-BAND MANAGEMENT IS USED TO MONITOR AND MAKE CONFIGURATION
CHANGES TO A NETWORK DEVICE OVER A NETWORK CONNECTION.
36.pWHAT MUST BE CONNECTED FOR A COMPUTER TO CONNECT TO THE DEVICE AND
PERFORM IN-BAND MANAGEMENT?
ANS. AT LEAST ONE NETWORK DEVICE INTERFACE ON THE DEVICE MUST BE CONNECTED TO
THE NETWORK AND BE OPERATIONAL. EITHER TELNET HTTP SSH CAN BE USED TO ACCESS
A CISCO DEVICE FOR IN-BAND MANAGEMENT.
37.pWHAT IS THE CISCO IOS COMMAND LINE INTERFACE?
ANS. THE CISCO IOS COMMAND LINE INTERFACE IS A TEXT BASED PROGRAM THAT
ENABLES ENTERING AND EXECUTING CISCO IOS COMMANDS TO CONFIGURE, MONITOR,
AND MAINTAIN CISCO DEVICES.
38.pWHAT ARE CLI COMMANDS USED TO DO?
ANS. CLI COMMANDS ENABLE ENTERING AND EXECUTING CISCO IOS COMMANDS TO
CONFIGURE, MONITOR AND MAINTAIN CISCO DEVICES.
39.pWHAT IS USED TO ACCESS A CISCO DEVICE FOR IN-BAND MANAGEMENT?
ANS. TELNET HTTP OR SSH CAN BE USED TO ACCESS A DEVICE FOR IN-BAND
MANAGEMENT.
40.pWHAT IS THE CISCO SDM EXPRESS TOOL USED FOR?
ANS. SDM CAN BE USED FOR ONLY IN-BAND MANAGEMENT TASK.
41.pHOW IS IT UNLIKE CLI?
ANS. IT CAN ONLY BE USED FOR IN BAND MANAGEMENT TASK.
42.pWHAT ARE FOUR OPTIONS THAT OFFERED ON THE FULL SDM PACKAGE?
ANS. FOUR OPTIONS:
1.p CONFIGURING ADDITIONAL LAN AND WAN CONNECTIONS
2.p CREATING FIREWALLS
3.p CONFIGURING VPN CONNECTIONS
4.p PERFORMING SECURITY TASK.
43.pWHAT IS A MAJOR DIFFERENCE BETWEEN THE CISCO SDM AND CLI?
ANS. SDM USED FOR IN BAND MANAGEMENT AND THEY DO NOT ALL
USE THE SAME COMMANDS
44.pWHY IS NECESSARY TO USE CLI?
ANS. SOME ROUTERS DO NOT SUPPORT SDM
45.pWHAT ARE THE FIVE STEPS INVOLVED IN FOLLOWING BEST PRACTICES WHEN INSTALLING A
NEW DEVICE?
ANS. THE FIVE STEPS FOLLOWING BEST PRACTICES:
1.p CREATE FIREWALLS
2.p CONFIGURE VPN
3.p PERFORM SECURITY
4.p CONFIGURE LAN
5.p QUICK START GUIDE
46.pHOW DO YOU START USING THE CISCO SDM EXPRESS?
ANS. CONNECT AN ETHERNET CABLE FROM THE PC NIC TO THE ETHERNET PORT ON THE
ROUTER OR T HE ISR.
47.pWHAT DOES CISCO SDM EXPRESS TOOL PROVIDE?
ANS. CISCO ROUTER AND SECURITY DEVICE MANAGER.
48.pWHEN IS THE ROUTER AVAILABLE ON THE LAN?
ANS. AFTER THE INITIAL CONFIGURATION IS COMPLETED THE ROUTER IS AVAILABLE ON THE
LAN THE ROUTER CAN ALSO CAN ALSO HAVE A WAN CONNECTION, A FIREWALL AND UP
TO 30 SECURITY ENHANCEMENT CONFIGURED.
49.pWHAT INFORMATIN IS REQUIRED WHEN USING THE SDM EXPRESS BASIC CONFIGURATION?
ANS. THE INFORMATION REQUIRED:
1.p HOST NAME THE NAME ASSIGNED TO THE ROUTER
2.p DOMAIN NAME FOR THE ORGANIZATION EX. CISCO.COM
3.p USERNAME AND PASSWORD USED TO ACCESS SDM EXPRESS TO
CONFIGURE AND MONITOR THE ROUTER PASSWORD MUST BE 6 WORDS
4.p ENABLE SECRET PASSWORD THE PASSWORD THAT CONTROLS USER ACCESS
TO THE ROUTER WHICH AFFECTS THE ABILITY TO MAKE CONFIGURATION
CHANGES USING THE CLI, TELNET OR THE CONSOLE PORTS.
5.p LAN CONFIGURATION SETTING ENABLE THE ROUTER INTERFACE TO
PARTICIPATE ON THE CONNECTED LOCAL NETWORK.
50.pIF OR  IS USED WHAT KIND OF ADDRESS SHOULD BE USED?

ANS. THE ADDRESS USED TO ACCESS SDM EXPRESS NOT THE ADDRESS THAT WAS PROVIDED
IN THE QUICK START GUIDE. IT CAN BE A PRIVATE IP ADDRESS.

51.pWHAT ARE 3 OTHER LAN SETTINGS?


ANS. 3 SETTINGS:
1.p IP ADDRESS
2.p SUBNET MASK
3.p SUBNET BITS
52.pWHY IS IMPORTANT TO TAKE NOTICE OF THIS ADDRESS?
ANS. THIS ADDRESS IS IMPORTANT BECAUSE THIS IS THE ADDRESS TO ACCESS T HE SDM
NOT THE ADDRESS PROVIDED IN THE QUICK START GUIDE.
53.pWHAT DOES DHCP DYNAMICALLY ALLOCATE?
ANS. DHCP DYNAMICALLY ALLOCATES AN IP ADDRESS TO A NETWORK HOST WHEN THE
HOST IS POWERED UP.
54.pHOW LONG ARE ADDRESSES LEASED TO HOST?
ANS. THE ADDRESSES ARE LEASED FOR ONE DAY.
55.pIF YOU CHANGE THE LOWEST (STARTING) OR THE HIGHEST (ENDING) ADDRESS WHAT MUST
YOU BE AWARE OF?
ANS. YOU MUST BE AWARE THAT IF THE ADDRESS IS CHANGED IT MUST BE IN THE SAME
NETWORK OR SUBNET AS THE SAME NETWORK AS THE LAN INTERFACE ALSO IT THE
ADDRESS IS TO CHANGED TO DECREASE THE POOL SIZE IT MUST BE THE SAME NETWORK
AS THE STARTING IP ADDRESS.
56.pHOW DO YOU CONFIGURE A DEVICE LIKE A ROUTER FOR DHCP?
ANS. SELECT ENABLE DHCP ON LAN INTERFACE CHECKBOX. CHECKING THIS BOX ENABLES
THE ROUTER TO ASSIGN PRIVATE IP ADDRESSES, TO DEVICES ON THE LAN.
57.pWHAT ARE 3 PIECES OF INFORMATION NEED TO CONFIGURED FOR A DEVICE FOR DHCP?
ANS. THREE PIECES OF INFORMATION:
1.p DOMAIN NAME
2.p PRIMARY DOMAIN SERVER
3.p SECONDARY DOMAIN SERVER
58.pWHAT DOES THE PRIMARY DOMAIN NAME SERVER RESOLVE?
ANS. PRIMARY DOMAIN NAME SERVER RESOLVE URLS
59.pWHAT IS SECONDARY DOMAIN NAME SERVER FIELD USED?
ANS. THE DOMAIN NAME SERVER IS USED IF THE PRIMARY DNS SERVER DOES NOT
RESPOND.
60.pWHAT ARE SERIAL CONNECTIONS USED TO CONNECT?
ANS. A SERIAL CONNECTION CAN BE USED TO CONNECT NETWORKS THAT ARE SEPARATED
BY LARGE GEOGRAPHICAL DISTANCES.
61.pWHAT DO WAN NETWORKS INTERCONNECTIONS REQUIRE?
ANS. WAN NETWORKS INTERCONNECTIONS REQUIRE A TELECOMMUNICATION SERVICE
PROVIDER (TSP)
62.pWHAT NEEDS TO BE DETERMINED PRIOR TO SETTING UP THE CONNECTION?
ANS. PRIOR TO SETTING UP THE CONNECTION IT NEEDS TO BE DETERMINED WHAT TYPE
OF CONNECTION AND PROTOCOL ENCAPSULATION REQUIRED.
63.pWHAT ARE 3 DIFFERENT ENCAPSULATION TYPES?
ANS. 3 ENCAPSULATION TYPES:
1.p HIGH LEVEL DATA LINK CONTROL (HLDC)
2.p FRAME RELAY
3.p POINT-TO-POINT PROTOCOL (PPP)
64.pWHAT TYPES OF ENCAPSULATION USE A  c  ADDRESS OR AN  i?
ANS. Have to check the cisco academy for this answer
65.pWHAT IS THE DIFFERENCE BETWEEN CISCO SDM AND CISCO SDM EXPRESS?
ANS. THE DIFFERENCE ESSENTIALLY IS AFTER THE ROUTER͛S BASIC CONFIGURATION IS
COMPLETED USING SDM EXPRESS USERS SWITCH TO SDM. ENABLING NAT REQUIRES THE
USE OF SDM.
66.pWHAT DOES  ENABLE HOST TO DO?
ANS. ENABLES THE HOSTS ON THE INTERNAL LOCAL NETWORK TO SHARE THE
SINGLE REGISTERED IP ADDRESS ASSIGNED TO THE WAN INTERFACE. THIS WAY HOSTS
WITH INTERNAL PRIVATE ADDRESSESS CAN HAVE ACCESS TO THE INTERNET.
67.pWITH WHAT DO INTERNAL PRIVATE ADDRESSES HAVE ACCESS TO?
ANS. HAVE ACCESS TO THE INTERNET.
68.pLIST THE FOUR STEPS FOR CONFIGURING ?
ANS. FOUR STEPS:
@p ENABLE  CONFIGURATION USING 
2.p NAVIGATE THROUGH THE BASIC NAT WIZARD
3.p SELECT THE INTERFACE AND SET RANGES
4.p REVIEW THE CONFIGURATION
69.pWHICH HOST ARE TRANSLATED?
ANS. ONLY THE HOSTS WITH THE INTERNAL ADDRESS RANGES SPECIFIED IN THE SDM
CONFIGURATION ARE TRANSLATED. IT IS IMPORTANT TO VERIFY THAT ALL ADDRESS
RANGES THAT NEED ACCESS TO THE INTERNET ARE INCLUDED.
70.pWHAT ARE THE TWO LEVELS OF ACCESS TO THE COMMAND-LINE INTERFACE SUPPORTED BY
THE CISCO IOS?
ANS. THE TWO LEVELS OF ACCESS TO THE COMMAND-LINE INTERFACE:
1.p ÷ cMODE
@p › ›c
@pWHEN A ROUTER IS POWERED ON, WHAT ACCESS-LEVEL WILL THE ROUTER DEFAULT TO?
c
ANS. WHEN A ROUTER IS POWERED ON THE ACCESS LEVEL DEFAULTS TO
. THIS MODE IS INDICATED BY THE COMMAND LINE PROMPT  
72.pWHICH COMMANDS CAN BE EXECUTED IN T HE c
ANS. COMMANDS THAT CAN BE EXECUTED IN c ARE LIMITED TO
OBTAINING INFORMATION ABOUT HOW THE DEVICE IS OPERATING, AND
TROUBLESHOOTING USING SOME SHOW COMMANDS AND THE  AND c 
UTILITIES.
73.pWHAT IS THE COMMAND LINE PROMPT WHEN IN USER MODE?
ANS. HAVE TO RESEARCH THIS ANSWER??????????
74.pWHAT ACCESS LEVEL IS REQUIRED IN ORDER TO ENTER COMMANDS THAT CAN ALTER THE
OPERATION OF THE DEVICE?
ANS. TO ALTER THE OPERATION OF THE DEVICE THE ACCESS LEVEL MUST BE    
cc@
75.pWHAT COMMAND IS ENTERED TO ACCESS   c?
ANS. THE COMMAND TO ENTER TO ACCESS    c IS  i
@p WHAT IS THE COMMAND LINE PROMPT WHEN IN PRIVILEGED MODE?
ANS. THE COMMAND LINE PROMPT FOR PRIVILEGED MODE IS  
77.pWHAT IS ENTERED AT THE COMMAND PROMPTS TO DISABLE T HE PRIVILEGE MODE AND
RETURN THE DEVICE TO USER MODE?
ANS. TO DISABLE P    MODE AND RETURN TO  ENTER  i 
AT THE COMMAND PROMPTS.
78.pWHAT COMMAND IS ENTERED TO ACCESS i CONFIGURATION MODE.
ANS. TO ENTER iCONFIGURATION MODE TYPE THE COMMAND CONFIGURE
TERMINAL OR CONFIG TERMINAL   c
!
"@pWHAT IS THE COMMAND LINE PROMPT WHEN THE IN GLOBAL CONFIGURATION
MODE?
ANS. THE COMMAND LINE PROMPT FOR GLOBAL CONFIGURATION MODE IS
  c
!
80.pWHAT IS INTERFACE CONFIGURATION MODE IS USED TO DO?
ANS. INTERFACE CONFIGURATION MODE IS USED TO CONFIGURE   
INTERFACES.
81.pTO ACCESS INTERFACE CONFIGURATION MODE FROM GLOBAL CONFIGURATION
MODE, WHAT COMMAND IS TYPED?
ANS. TO ACCESS INTERFACE CONFIGURATION MODE FROM GLOBAL
CONFIGURATION TYPE THE COMMAND INTERFACE {TYPE} {NUMBER}. INTERFACE
CONFIGURATION MODE IS INDICATED BY T HE COMMAND PROMPT:
82.pWHAT IS THE COMMAND LINE PROMPT WHEN IN ROUTER CONFIGURATION MODE?
ANS. THE COMMAND LINE PROMPT IN ROUTER CONFIGURATION MODE IS:
  c

!
83.pWHAT IS THE COMMAND LINE PROMPT WHEN IN ROUTER CONFIGURATION SUBMODE?
ANS. THE COMMAND LINE PROMPT IS   c
 !
84.pWHAT IS THE ROUTER CONFIGURATION SUBMODE USED FOR?
ANS. ?????????????????????????????????????
85.pWHAT IS THE REASON WHY NETWORK TECHS PREFER TO USE THE CISCO IOS CLI TO
CONFIGURE ROUTERS.
ANS. TECHS PREFER TO USE CISCO IOS CLI BECAUSE THEY OFFER COMMANDS THAT ARE
NEEDED TO CONFIGURE DEVICES.

@p  WILL ENTERING THE HELP OR ͞?͟ DISPLAY?


 @
 
 FEW CHARACTERS OF A COMMAND IS KNOWN BUT THE E XACT
COMMAND IS NOT, ENTER AS MUCH AS THE COMMAND AS POSSIBLE, FOLLOWED BY A ?,
NOTE THAT THERE IS NO SPACE BETWEEN THE COMMAND CHARACTERS AND THE ?. IF A ?
IS ENTERED AND NOTHING MATCHES, THE HELP LIST WILL BE EMPTY. THIS INDICATES THAT
THE COMMAND STRING IS NOT SUPPORTED BY THE COMMAND.
     
   
c
cc 
 
 c 
ic#    
 
 i   @c  
   c c 
 @ c c   c#$c@ 
   c @
     c #   
 i@   c  c     
c @
@p $c  c
 @
@p %  c
 @% i 
  @
"@p  c %    c  c
 @½INVALID INPUT DETECTED MEANS AN INCORRECT COMMAND HAS BEEN ENTERED.
90.pWHAT DOES ^ INDICATE?
ANS ^ APPEARS AT THE POINT IN THE COMMAND STRING WHERE THERE IS AN INCORRECT
OR UNRECOGNEZED CHARACTER. THE USER CAN RETURN TO THE POINT WHERE THE
ERROR WAS MADE AND USE THE HELP FUNCTION TO DETERMINE THE CORRECT
COMMAND TO USE.
91.pBY DEFAULT HOW MANY COMMAND LINES RETAIN IN THE HISTORY BUFFER?
ANS. BY DEFAULT 10 COMMAND LINES ARE HELD IN THE HISTORY BUFFER.
92.pWHAT IS THE MAXIMUM NUMBER OF COMMAND LINES RETAIN IN THE HISTORY BUFFER?
ANS. THE MAXIMUM NUMBER OF COMMAND LINES IS 256.

.93. WHAT COMMANDS ARE ENTERED IN ORDER TO CHANGE THE NUMBER OF COMMAND LINES

THAT ARE RECORDED DURING A TERMINAL SESSION?

ANS. THE COMMAND TO CHANGE THE NUMBER OF COMMAND LINES IS TO USE THE
TERMINAL HISTORY S IZE COMMAND.

93.pWHAT ARE THE TWO WAYS YOU CAN RECALL THE MOST RECENT COMMANDS IN THE
HISTORY BUFFER?
ANS. TO RECALL THE MOST RECENT COMMANDS IN THE HISTORY BUFFER:
1.p PRESS CTRL-P
2.p UP ARROW KEY.
94.pWHAT ARE THE TWO WAYS YOU CAN RETURN TO THE MOST RECENT COMMANDS IN THE
HISTORY BUFFER?
ANS. TO RETURN TO A MORE RECENT COMMAND IN THE HISTORY BUFFER PRESS c 
  
"@p c cIOS CLI SHOW COMMANDS CAN BE USED TO VIEW WHAT
INFORMATION?
 @c c c  c   
  i 
 c
     
  c@
96.pWHAT ARE THREE USES FOR NETWORK TECHS USING SHOW COMMANDS?
ANS. THREE USES FOR NETWORK TECHS USING THE SHOW COMMAND:
1.p VIEWING CONFIGURATION FILES
2.p CHECKING THE STATUS OF DEVICE INTERFACES AND PROCESSES
3.p VERIFYING THE DEVICE OPERATIONAL STATUS
97.pWHAT IS ONE OF THE FIRST CONFIGURATION TASK THAT SHOULD BE PERFORMED?
ANS. ONE OF THE FIRST CONFIGURATION TASK IS FOR THE DEVICE TO BE GIVEN A
UNIQUE NAME.
98.pWHAT COMMAND SHOULD BE ENTERED IN ORDER TO CHANGE THE HOSTNAME OF
A ROUTER ?
ANS. THE COMMAND TO CHANGE THE HOSTNAME OF THE ROUTER IS..
  &'()*+!,'-.(/01$(/01
""@pONCE A HOSTNAME IS CONFIGURED ON A DEVICE WHAT SHOULD BE THE NEXT
CONFIGURATION STEP?
ANS. THE NEXT CONFIGURATION STEP IS TO CONFIGURE PASSWORDS TO PREVENT
ACCESS TO THE DEVICE BY UNAUTHORIZED INDIVIDUALS.
22@p WHAT DO   i AND  ic COMMANDS
PREVENT?
ANS. THESE COMMANDS ARE USED TO RESTRICT ACCESS TO    c
@
101.p WHAT COMMANDS ARE ENTERED TO SET ENABLE PASSWORD
ANS. 1. ROUTER (config) # enable password <password>
ROUTER (config) # enable secret password <password>
102.p WHAT IS THE DIFFERENCE IN THE COMMANDS?
ANS. THE DIFFERENCE IN THE TWO COMMANDS IS THAT THE ENABLE PASSWORD IS
NOT ENCRYPTED BY DEFAULT. IF THE ENABLE PASSWORD IS SET , FOLLOWED BY
THE ENABLE SECRET PASSWORD, THE ENABLE SECRET COMMAND OVERRIDES THE
ENABLE PASSWORD COMMAND.
103.p WHAT IS A BANNER?
ANS. A BANNER IS TEXT THAT THE USER SEES WHEN INITIALLY LOGGING ON TO THE
ROUTER.
104.p WHAT SHOULD A BANNER WARN AGAINST?
ANS. A BANNER SHOULD WARN AGAINST UNAUTHORIZED ACCESS.
105.p WHAT IS THE PURPOSE OF HAVING A  BANNER AND LOGIN
INFORMATION BANNER?
ANS. A MOTD BANNER IS A MESSAGE OF THE DAY BANNER
106.p WHAT IS THE PURPOSE OF A DELIMITING CHARACTER (#) ALLOW THE USER TO
DO?
ANS. THE DELIMITING CHARACTER ALLOWS THE USER TO CREATE A MULTI-LINE
BANNER.
107.p WHAT DOES THE COMMAND LOGGING SYNCHRONOUS DO?
ANS. TO KEEP MESSAGES FROM INTEFERING WITH THE TYPED INPUT THE LOGGING
SYNCHRONOUS COMMAND CAN BE ENTERED IN GLOBAL CONFIGURATION MODE.
108.p WHAT DEFAULT FEATURE IN TURNED OFF BY ENTERING THE COMMAND NO IP
DOMAIN-LOOKUP?
ANS. THIS COMMAND HELPS RESOLVE UNKNOWN NAMES ENTERED IN ENABLE
MODE ALSO MISTYPED OR ANY WORDS NOT RECOGNIZED BY THE ROUTER.
109.p WHAT TYPE OF CONNECTION IS USED FOR INITIAL DEVICE CONFIGURATION?
ANS.TO USE A PC ATTACHED TO A CONSOLE PORT ON THE DEVICE IS FREQUENTLY
USED FOR INITIAL CONNECTIONS.
110.p WHAT ARE 3 COMMANDS NEEDED TO BE ENTERED TO SET THE PASSWORD FOR
CONSOLE CONNECTION ACCESS?
ANS. THESE COMMANDS ARE DONE IN GLOBAL CONFIGURATION:
1.ROUTE (config)# line console 0
2.Router (config)# password <password>
3.Router (config)#login
WHEN THE DEVICE IS CONNECTED TO THE NETWORK IT CAN BE ACCESSED OVER
THE NETWORK CONNECTION. WHEN THE DEVICE IS ACCESSED O VER THE
NETWORK IT IS CONSIDERED A VTY CONNECTION. THE PASSWORD MUST BE
CONFIGURED ON THE VTY PORT.
111.p WHAT WILL THE CONSOLE CONNECTION PASSWORDS (ABOVE IN #94 PREVENT?
ANS. UNAUTHORIZED ACCESS IN USER MODE.
112.p WHEN IS A CONNECTION CONSIDERED A VIRTUAL TERMINAL CONNECTION?
ANS.????????????????????????????????????
113.p WHAT ARE THREE COMMANDS NEED TO BE ENTERED TO SET THE PASSWORD
FOR VIRTUAL PORT ACCESS?
ANS. Route (config) # line vty 0 4
Router (config) # password <password>
Router (config)# login
114.p Enter the command to ensure that the passwords are encrypted.
Ans. THE GLOBAL CONFIGURATION COMMAND SERVICE PASSWORD ENCRYPTION
ENSURES THAT ALL PASSWORDS ARE ENCRYPTED.
115.p WHAT COMMAND IS ENTERED TO COPY THE CHANGES MADE TO THE RUNNING
CONFIGURATION BACK TO THE STORED STARTUP CONFIGURATION FILE?
ANS.IF THE RUNNING CONFIGURATION IS CHANGED IT MUST BE COPIED TO THE
STARTUP CONFIGURATION FILE OR THE CHANGES ARE LOST WHEN THE DEVICE IS
POWERED DOWN.
116.p WHAT INTERFACES DO LO CAL NETWORK CONNECTIONS USE?
ANS. THE INTERFACES LOCAL NETWORK USE ARE ROUTER INTERFACE AND
ETHERNET AND SERIAL INTERFACES.
117.p WHAT INTERFACE DOES A WAN CONNECTION REQUIRE?
ANS. WAN CONNECTION REQUIRE A SERIAL CONNECTION THROUGH AN ISP
118.p WHAT IS REQUIRED ON A SERIAL INTERFACE UNLIKE A ETHERNET INTERFACES?
ANS. SERIAL INTERFACES REQUIRE A CLOCK SIGNAL TO CONTROL TIMING OF THE
COMMUNICATION CALLED A CLOCK RATE.
119.p WHICH DEVICES ARE CONSIDERED DCE DEVICES THAT PROVIDE THE CLOCK
RATE?
ANS. A MODEM OR CSU/DSU
120.p WHICH DEVICES ARE CONSIDERED DTE DEVICES THAT ACCEPT THE CLOCK RATE?
ANS/ CISCO ROUTERS ARE DTE DATA TERMINAL EQUIPMENT
121.p IF ROUTERS ARE GOING TO BE CONFIGURED DCE DEVICE WHAT MUST BE SET ON
THE ROUTER INTERFACE?
ANS. A CLOCK RATE MUST BE SET ON THE ROUTER INTERFACE.
122.p CONFIGURATION ON ANY INTERFACE ON THE ROUTER MUST BE ACCOMPLISHED
IN WHAT MODE?
ANS. MUST BE ACCOMPLISHED IN GLOBAL CONFIGURATION MODE.
123.p ENTER THE FIVE STEPS TO CONFIGURE AN INTERFACE.
ANS. THE FIVE STEPS TO CONFIGURE AN INTERFACE:
1.p SPECIFY THE TYPE OF INTERFACE Router (config)#
SPECIFY A DESC. Router (config-if)#
2.p CONFIG IP ADD AND SUBNET MK Router (config-if)#
3.p SET CLOCK RATE Router (cnfig-if)#
4.p ENABLE INTERFACE Router (config-if)#
124.p WHAT COMMAND IS USED IN ORDER TO TURN OFF AN INTERFACE FOR
MAINTENANCE OR TROUBLESHOOTING?
ANS. THE COMMAND IS@@  

Das könnte Ihnen auch gefallen