Beruflich Dokumente
Kultur Dokumente
ANS. ISR IS IDEAL FOR SMALL TO MEDIUM SIZED BUSINESSES AND FOR ISP MANAGED
CUSTOMERS.
4.p WHAT DOES THE (IOS) SOFTWARE FEATUES ENABLE A CISCO DEVICE TO DO?
ANS. IOS SOFTWARE PROVIDES FEATUES THAT ENABLE A CISCO DEVICE TO SEND AND
RECEIVE NETWORK TRAFFIC USINGA WIRED OR WIRELESS NETWORK. CISCO IOS SOFTWARE
IS OFFERED TO CUSTOMERS IN MODULES CALLED IMAGES.. THESE IMAGES SUPPORT
VARIOUS FEATURES FOR BUSINESSES OF EVERY SIZE..
5.p WHAT IS AN IP BASED IMAGE?
ANS. THE ENTRY LEVEL CISCO IOS SOFTWARE IMAGE IS CALLED THE . THE
SOFTWARE SUPPORTS SMALL TO MEDIUM SIZED BUSINESSES AND
SUPPORTS ROUTING BETWEEN NETWORKS.
6.p WHAT DOES THE CISCO SOFTWARE SUPPORT?
ANS. SUPPORTS SMALL TO MEDIUM-SIZED BUSINESSES ROUTING BETWEEN NETWORKS.
7.p WHAT FUNCTIONALITY IS ADDED BY INSTALLING THE
ANS.
PROVIDES ADVANCED SECURITY FEATURES, SUCH AS
PRIVATE NETWORKING AND FIREWALLS.
8.p WHAT IS SHIPPED WITH EACH CISCO DEVICE?
ANS. EACH DEVICE IS SHIPPED WITH CABLES AND DOCUMENTATION NEEDED TO POWER
UP THE DEVICE AND BEGIN THE INSTALLATION.
9.p WHAT ARE THREE TOOLS REQUIRED TO INSTALL A NEW CISCO DEVICE?
ANS. THREE TOOLS REQUIRED:
1.p CABLE TIES PC WITH TERMINAL EMULATION PROGRAM
2.p NUMBER 2 PHILIP SCREWDRIVER
3.p CABLES FOR WAN INTERFACES, LAN INTERFACES AND USB INTERFACES.
10.pWHAT SHOULD YOU READ BEFORE BEGINNING ANY EQUIPMENT INSTALLATION?
ANS. BEFORE ATTEMPTING ANY INSTALLATION BE SURE TO READ THE <
pWHAT ARE THE SIX STEPS TO PERFORM A POWER UP PROCEDURE ON AN ISR 1841?
ANS. THE STEPS:
1.p Securely mount and ground the device
2.p Seat the external compact flash card
3.p Connect the power cable
4.p Configure the terminal emulation software on the pc and connect the pc to
the console port.
5.p Turn on the router
6.p Observe the startup messages on the pc as the router boots up.
12.pLIST THE 3 STAGES OF THE ROUTER BOOTUP PROCESS.
ANS. THE THREE STAGES OF THE BOOTUP:
1.p PERFORM POWER-ON SELF TEST (POST) AND LOAD THE BOOTSTRAP
PROGRAM. POST IS USED TO TEST ROUTER HARDWARE
2.p LOCATE AND LOAD THE CISCO IOS SOFTWARE
3.p LOCATE AND EXECUTE THE STARTUP CONFIGURATION FILE OR ENTER SETUP
MODE. TO BEGIN THE CONFIGRUATION PROCESS.
13.pWHAT ARE 3 PLACES WHERE IOS CISCO FILES CAN BE LOCATED?
ANS. THREE PLACES THE FILES CAN BE LOCATED:
1.p FLASH MEMORY
2.p TFTP SERVER
3.p ANOTHER LOCATION INDICATED IN STARTUP CONFIGURATION FILE.
14.pWHAT HAPPENS IF A CONFIG FILE IS NOT FOUND?
ANS. THE ROUTER PROMPTS USER TO ENTER SETUP MODE.,TO BEGIN THE CONFIGURATION
PROCESS.
15.pWHAT HAPPENS IF THE CONFIG FILE IS FOUND?
ANS. IT IS COPIED INTO RAM AND PROMPT CONTAINING THE HOST NAME IS DISPLAYED.
16.pWHAT IS THE STARTUP CONFIGURATION?
ANS. THE STARTUP CONFIGURATION FILE IS THE SAVED CONFIGURATION FILE THAT SETS
THE PROPERTIES OF THE DEVICE EACH TIME THE DEVICE IS POWERED UP. THIS FILE IS
STORED IN NON VOLATILE RAM.
17.pWHERE IS THE STARTUP CONFIGURATION FILE STORED?
ANS THE STARTUP CONFIGURATION FILE IS STORED IN NON VOLATILE RAM.
18.pWHAT HAPPENS TO THE FILES IN NVRAM WHEN POWER TO THE DEVICE IS POWERED OFF?
ANS. WHEN THE DEVICE IS POWERED OFF THE CONFIG FILES ARE LOST.
19.pWHAT DOES A CISCO ROUTER DO WHEN IT IS POWERED ON?
ANS. WHEN THE ROUTER IS FIRST POWERED ON IT LOADS THE CISCO IOS SOFTWARE TO
WORKING MEMORY, OR RAM.
20.pWHAT IS THE SECOND THING A CISCO ROUTER WILL DO WHEN POWERED UP?
ANS. THE STARTUP CONFIGURATION FILE IS COPIED FROM NVRAM TO RAM.
21.pWHAT DOES THE TERM RUNNING CONFIGURATION REFER TO?
ANS. RUNNING CONFIG REFERS TO THE CURRENT CONFIGURATION RUNNING IN RAM ON
THE DEVICE. THIS FILE CONAINS THE COMMANDS USED TO DETERMINE HOW THE DEVICE
OPERATES ON THE NETWORK. THE RUNNING CONFIGURATION FILES IS STORED IN THE
WORKING MEMORY OF THE DEVICE.
22.pWHAT HAPPENS TO THE INFORMATION ON RAM OR RUNNING CONFIGURATION WHEN IT
IS TURNED OFF?
ANS. THE RUNNING CONFIGURATION IS LOST EACH TIME THE DEVICE IS SHUT DOWN.
23.pIF CHANGES ARE MADE TO THE RUNNING CONFIGURATION WHAT IS NECESSARY IN ORDER
FOR THE CHANGES TO BE SAVED WHEN THE DEVICE IS POWERED OFF?
ANS. IT IS NECESSARY TO MANUALLY COPY THE RUNNING CONFIGURATION TO THE
STARTUP CONFIGURATION FILE. COPY RUNNING CONFIGURATION STARTUP CONFIG OR
COPY RUN START SAVES THE RUNNING CONFIG TO THE STARTUP CONFIG FILE.
24.pWHAT COMMAND IS USED TO SAVE THE ROUTER͛S RUNNING CONFIGURATION TO THE
STARTUP CONFIGURATION ?
ANS. COPY RUNNING-CONFIG STARTUP-CONFIG
25.pWHAT COMMAND CAN BE USED TO TROUBLESHOOT SOME OF THE BASIC HARDWARE AND
SOFTWARE COMPONENTS USED DURING THE BOOTUP PROCESS?
ANS.
.
26.pWHAT DOES THE CONFIGURATION REGISTER SETTING OF j jTELL THE ROUTER TO DO?
ANS.0X2102 IS THE FACTORY DEFAULT SETTING FOR THE CONFIGURATION REGISTER. THIS
VALUE INDICATES T HAT THE ROUTER ATTEMPTS TO LOAD A CISCO SOFTWARE IMAGE
FROM FLASH AND LOADS THE STARTUP CONFIGURATION FILE INTO VNVRAM
27.pIF THERE IS A SECOND VALUE IN PARENTHESIS WHAT DOES IT DENOTE?
ANS. A SECOND VALUE DENOTES THE CONFIGURATION REGISTER VALUE TO B E USED
DURING THE NEXT RELOAD OF THE ROUTER.
28.pLIST THREE REASONS THAT A ROUTER MAY FAIL TO BOOTUP PROPERLY.
ANS. REASONS THE ROUTER MIGHT BOOTUP IMPROPERLY:
1.p CORRUPT OF MISSING IOS FILE
2.p INCORRECT LOCATION FOR CISCO IMAGE
3.p INADEQUATE MEMORY TO LOAD CISCO IMAGE.
29.pIF THE ROUTER FAILS TO BOOT THE IOS HOW DOES IT BOOT UP?
ANS. IF THE ROUTER FAILS TO BOOT THE IOS IT THEN BOOTS UP IN ROM MONITOR.
ROMmon SOFTWARE IS A SIMPLE COMMAND SET STORED IN READ ONLY MEMORY.
30.pWHEN THE ROUTER BOOTS UP TO ROMmon MODE WHAT IS ONE OF THE FIRST STEPS IN
TROUBLESHOOTING?
ANS. ONE OF THE FIRST STEPS IN TROUBLESHOOTING IS TO LOOK IN FLASH MEMORY FOR A
VALID IMAGE USING THE DIR FLASH: COMMAND IF AN IMAGE IS LOCATED ATTEMPT TO
BOOT THE IMAGE WITH THE BOOT FLASH:COMMAND.
31.pIF THE ROUTER BOOTS PROPERLY WITH THE i
COMMAND, WHAT ARE TWO
POSSIBLE R EASONS WHY THE CISCO IOS IMAGE DID NOT LOAD FROM FLASH INITIALLY?
ANS. FIRST USE THE SHOW VERSION VERSION COMMAND TO CHECK THE CONFIGURATION
REGISTER TO ENSURE T HAT IT IS CONFIGURED FOR THE DEFAULT BOOT SEQUENCE. IF THE
CONFIGURATION REGISTER VALUE IS CORRECT USE THE SHOW STARTUP-CONFIG
COMMAND TO SEE IF THERE IS A BOOTSYSTEM COMMAND THAT INSTRUCTS THE ROUTER
TO USE A DIFFERENT LOCATION FOR THE CISCO IOS IMAGE.
32.pWHAT DOES AN OUT-OF-BAND MANAGEMENT CONNECTION REQUIRE?
ANS. OUT-OF-BAND MANAGEMENT REQUIRES A COMPUTER TO BE DIRECTLY CONNECTED
TO THE CONSOLE PORT OR AUXILLARY PORT (AUX) OF THE NETWORK DEVICE BEING
CONFIGURED. THIS TYPE OF CONNECTION DOES NOT REQURE THE LOCAL NETWORK
CONNECTIONS ON THE DEVICE TO BE ACTIVE
33.pWHY DO TECHNICIANS USE
i TO INITIALLY CONFIGURE A
NETWORK DEVICE?
ANS. THEY USE
i TO INITIALLY CONFIGURE A NETWORK
DEVICE BECAUSE UNTIL PROPERLY CONFIGURED THE DEVICE CANNOT PARTICIPATE IN THE
NETWORK.
i IS ALSO USEFUL WHEN THE NETWORK
CONNECTIVITY IS NOT FUNCTIONING CORRECTLY AND THE DEVICE CANNOT BE REACHED
OVER THE NETWORK. PERFORMING
i TASKS REQUIRES A TERMINAL
EMULATION CLIENT INSTALLED ON THE PC.
34.pWHEN IS OUT-OF-BAND MANAGEMENT USEFUL?
ANS@
i IS USEFUL WHEN THE NETWORK CONNECTIVITY IS
NOT FUNCTIONING CORRECTLY AND THE DEVICE CANNOT BE REACHED OVER THE
NETWORK.
35.pWHEN IS IN-BAND MANAGEMENT USED?
ANS. IN-BAND MANAGEMENT IS USED TO MONITOR AND MAKE CONFIGURATION
CHANGES TO A NETWORK DEVICE OVER A NETWORK CONNECTION.
36.pWHAT MUST BE CONNECTED FOR A COMPUTER TO CONNECT TO THE DEVICE AND
PERFORM IN-BAND MANAGEMENT?
ANS. AT LEAST ONE NETWORK DEVICE INTERFACE ON THE DEVICE MUST BE CONNECTED TO
THE NETWORK AND BE OPERATIONAL. EITHER TELNET HTTP SSH CAN BE USED TO ACCESS
A CISCO DEVICE FOR IN-BAND MANAGEMENT.
37.pWHAT IS THE CISCO IOS COMMAND LINE INTERFACE?
ANS. THE CISCO IOS COMMAND LINE INTERFACE IS A TEXT BASED PROGRAM THAT
ENABLES ENTERING AND EXECUTING CISCO IOS COMMANDS TO CONFIGURE, MONITOR,
AND MAINTAIN CISCO DEVICES.
38.pWHAT ARE CLI COMMANDS USED TO DO?
ANS. CLI COMMANDS ENABLE ENTERING AND EXECUTING CISCO IOS COMMANDS TO
CONFIGURE, MONITOR AND MAINTAIN CISCO DEVICES.
39.pWHAT IS USED TO ACCESS A CISCO DEVICE FOR IN-BAND MANAGEMENT?
ANS. TELNET HTTP OR SSH CAN BE USED TO ACCESS A DEVICE FOR IN-BAND
MANAGEMENT.
40.pWHAT IS THE CISCO SDM EXPRESS TOOL USED FOR?
ANS. SDM CAN BE USED FOR ONLY IN-BAND MANAGEMENT TASK.
41.pHOW IS IT UNLIKE CLI?
ANS. IT CAN ONLY BE USED FOR IN BAND MANAGEMENT TASK.
42.pWHAT ARE FOUR OPTIONS THAT OFFERED ON THE FULL SDM PACKAGE?
ANS. FOUR OPTIONS:
1.p CONFIGURING ADDITIONAL LAN AND WAN CONNECTIONS
2.p CREATING FIREWALLS
3.p CONFIGURING VPN CONNECTIONS
4.p PERFORMING SECURITY TASK.
43.pWHAT IS A MAJOR DIFFERENCE BETWEEN THE CISCO SDM AND CLI?
ANS. SDM USED FOR IN BAND MANAGEMENT AND THEY DO NOT ALL
USE THE SAME COMMANDS
44.pWHY IS NECESSARY TO USE CLI?
ANS. SOME ROUTERS DO NOT SUPPORT SDM
45.pWHAT ARE THE FIVE STEPS INVOLVED IN FOLLOWING BEST PRACTICES WHEN INSTALLING A
NEW DEVICE?
ANS. THE FIVE STEPS FOLLOWING BEST PRACTICES:
1.p CREATE FIREWALLS
2.p CONFIGURE VPN
3.p PERFORM SECURITY
4.p CONFIGURE LAN
5.p QUICK START GUIDE
46.pHOW DO YOU START USING THE CISCO SDM EXPRESS?
ANS. CONNECT AN ETHERNET CABLE FROM THE PC NIC TO THE ETHERNET PORT ON THE
ROUTER OR T HE ISR.
47.pWHAT DOES CISCO SDM EXPRESS TOOL PROVIDE?
ANS. CISCO ROUTER AND SECURITY DEVICE MANAGER.
48.pWHEN IS THE ROUTER AVAILABLE ON THE LAN?
ANS. AFTER THE INITIAL CONFIGURATION IS COMPLETED THE ROUTER IS AVAILABLE ON THE
LAN THE ROUTER CAN ALSO CAN ALSO HAVE A WAN CONNECTION, A FIREWALL AND UP
TO 30 SECURITY ENHANCEMENT CONFIGURED.
49.pWHAT INFORMATIN IS REQUIRED WHEN USING THE SDM EXPRESS BASIC CONFIGURATION?
ANS. THE INFORMATION REQUIRED:
1.p HOST NAME THE NAME ASSIGNED TO THE ROUTER
2.p DOMAIN NAME FOR THE ORGANIZATION EX. CISCO.COM
3.p USERNAME AND PASSWORD USED TO ACCESS SDM EXPRESS TO
CONFIGURE AND MONITOR THE ROUTER PASSWORD MUST BE 6 WORDS
4.p ENABLE SECRET PASSWORD THE PASSWORD THAT CONTROLS USER ACCESS
TO THE ROUTER WHICH AFFECTS THE ABILITY TO MAKE CONFIGURATION
CHANGES USING THE CLI, TELNET OR THE CONSOLE PORTS.
5.p LAN CONFIGURATION SETTING ENABLE THE ROUTER INTERFACE TO
PARTICIPATE ON THE CONNECTED LOCAL NETWORK.
50.pIF OR IS USED WHAT KIND OF ADDRESS SHOULD BE USED?
ANS. THE ADDRESS USED TO ACCESS SDM EXPRESS NOT THE ADDRESS THAT WAS PROVIDED
IN THE QUICK START GUIDE. IT CAN BE A PRIVATE IP ADDRESS.
.93. WHAT COMMANDS ARE ENTERED IN ORDER TO CHANGE THE NUMBER OF COMMAND LINES
ANS. THE COMMAND TO CHANGE THE NUMBER OF COMMAND LINES IS TO USE THE
TERMINAL HISTORY S IZE COMMAND.
93.pWHAT ARE THE TWO WAYS YOU CAN RECALL THE MOST RECENT COMMANDS IN THE
HISTORY BUFFER?
ANS. TO RECALL THE MOST RECENT COMMANDS IN THE HISTORY BUFFER:
1.p PRESS CTRL-P
2.p UP ARROW KEY.
94.pWHAT ARE THE TWO WAYS YOU CAN RETURN TO THE MOST RECENT COMMANDS IN THE
HISTORY BUFFER?
ANS. TO RETURN TO A MORE RECENT COMMAND IN THE HISTORY BUFFER PRESS c
"@p ccIOS CLI SHOW COMMANDS CAN BE USED TO VIEW WHAT
INFORMATION?
@ccc c
i
c
c@
96.pWHAT ARE THREE USES FOR NETWORK TECHS USING SHOW COMMANDS?
ANS. THREE USES FOR NETWORK TECHS USING THE SHOW COMMAND:
1.p VIEWING CONFIGURATION FILES
2.p CHECKING THE STATUS OF DEVICE INTERFACES AND PROCESSES
3.p VERIFYING THE DEVICE OPERATIONAL STATUS
97.pWHAT IS ONE OF THE FIRST CONFIGURATION TASK THAT SHOULD BE PERFORMED?
ANS. ONE OF THE FIRST CONFIGURATION TASK IS FOR THE DEVICE TO BE GIVEN A
UNIQUE NAME.
98.pWHAT COMMAND SHOULD BE ENTERED IN ORDER TO CHANGE THE HOSTNAME OF
A ROUTER ?
ANS. THE COMMAND TO CHANGE THE HOSTNAME OF THE ROUTER IS..
&'()*+!,'-.(/01$(/01
""@pONCE A HOSTNAME IS CONFIGURED ON A DEVICE WHAT SHOULD BE THE NEXT
CONFIGURATION STEP?
ANS. THE NEXT CONFIGURATION STEP IS TO CONFIGURE PASSWORDS TO PREVENT
ACCESS TO THE DEVICE BY UNAUTHORIZED INDIVIDUALS.
22@p WHAT DO i AND ic COMMANDS
PREVENT?
ANS. THESE COMMANDS ARE USED TO RESTRICT ACCESS TO c
@
101.p WHAT COMMANDS ARE ENTERED TO SET ENABLE PASSWORD
ANS. 1. ROUTER (config) # enable password <password>
ROUTER (config) # enable secret password <password>
102.p WHAT IS THE DIFFERENCE IN THE COMMANDS?
ANS. THE DIFFERENCE IN THE TWO COMMANDS IS THAT THE ENABLE PASSWORD IS
NOT ENCRYPTED BY DEFAULT. IF THE ENABLE PASSWORD IS SET , FOLLOWED BY
THE ENABLE SECRET PASSWORD, THE ENABLE SECRET COMMAND OVERRIDES THE
ENABLE PASSWORD COMMAND.
103.p WHAT IS A BANNER?
ANS. A BANNER IS TEXT THAT THE USER SEES WHEN INITIALLY LOGGING ON TO THE
ROUTER.
104.p WHAT SHOULD A BANNER WARN AGAINST?
ANS. A BANNER SHOULD WARN AGAINST UNAUTHORIZED ACCESS.
105.p WHAT IS THE PURPOSE OF HAVING A BANNER AND LOGIN
INFORMATION BANNER?
ANS. A MOTD BANNER IS A MESSAGE OF THE DAY BANNER
106.p WHAT IS THE PURPOSE OF A DELIMITING CHARACTER (#) ALLOW THE USER TO
DO?
ANS. THE DELIMITING CHARACTER ALLOWS THE USER TO CREATE A MULTI-LINE
BANNER.
107.p WHAT DOES THE COMMAND LOGGING SYNCHRONOUS DO?
ANS. TO KEEP MESSAGES FROM INTEFERING WITH THE TYPED INPUT THE LOGGING
SYNCHRONOUS COMMAND CAN BE ENTERED IN GLOBAL CONFIGURATION MODE.
108.p WHAT DEFAULT FEATURE IN TURNED OFF BY ENTERING THE COMMAND NO IP
DOMAIN-LOOKUP?
ANS. THIS COMMAND HELPS RESOLVE UNKNOWN NAMES ENTERED IN ENABLE
MODE ALSO MISTYPED OR ANY WORDS NOT RECOGNIZED BY THE ROUTER.
109.p WHAT TYPE OF CONNECTION IS USED FOR INITIAL DEVICE CONFIGURATION?
ANS.TO USE A PC ATTACHED TO A CONSOLE PORT ON THE DEVICE IS FREQUENTLY
USED FOR INITIAL CONNECTIONS.
110.p WHAT ARE 3 COMMANDS NEEDED TO BE ENTERED TO SET THE PASSWORD FOR
CONSOLE CONNECTION ACCESS?
ANS. THESE COMMANDS ARE DONE IN GLOBAL CONFIGURATION:
1.ROUTE (config)# line console 0
2.Router (config)# password <password>
3.Router (config)#login
WHEN THE DEVICE IS CONNECTED TO THE NETWORK IT CAN BE ACCESSED OVER
THE NETWORK CONNECTION. WHEN THE DEVICE IS ACCESSED O VER THE
NETWORK IT IS CONSIDERED A VTY CONNECTION. THE PASSWORD MUST BE
CONFIGURED ON THE VTY PORT.
111.p WHAT WILL THE CONSOLE CONNECTION PASSWORDS (ABOVE IN #94 PREVENT?
ANS. UNAUTHORIZED ACCESS IN USER MODE.
112.p WHEN IS A CONNECTION CONSIDERED A VIRTUAL TERMINAL CONNECTION?
ANS.????????????????????????????????????
113.p WHAT ARE THREE COMMANDS NEED TO BE ENTERED TO SET THE PASSWORD
FOR VIRTUAL PORT ACCESS?
ANS. Route (config) # line vty 0 4
Router (config) # password <password>
Router (config)# login
114.p Enter the command to ensure that the passwords are encrypted.
Ans. THE GLOBAL CONFIGURATION COMMAND SERVICE PASSWORD ENCRYPTION
ENSURES THAT ALL PASSWORDS ARE ENCRYPTED.
115.p WHAT COMMAND IS ENTERED TO COPY THE CHANGES MADE TO THE RUNNING
CONFIGURATION BACK TO THE STORED STARTUP CONFIGURATION FILE?
ANS.IF THE RUNNING CONFIGURATION IS CHANGED IT MUST BE COPIED TO THE
STARTUP CONFIGURATION FILE OR THE CHANGES ARE LOST WHEN THE DEVICE IS
POWERED DOWN.
116.p WHAT INTERFACES DO LO CAL NETWORK CONNECTIONS USE?
ANS. THE INTERFACES LOCAL NETWORK USE ARE ROUTER INTERFACE AND
ETHERNET AND SERIAL INTERFACES.
117.p WHAT INTERFACE DOES A WAN CONNECTION REQUIRE?
ANS. WAN CONNECTION REQUIRE A SERIAL CONNECTION THROUGH AN ISP
118.p WHAT IS REQUIRED ON A SERIAL INTERFACE UNLIKE A ETHERNET INTERFACES?
ANS. SERIAL INTERFACES REQUIRE A CLOCK SIGNAL TO CONTROL TIMING OF THE
COMMUNICATION CALLED A CLOCK RATE.
119.p WHICH DEVICES ARE CONSIDERED DCE DEVICES THAT PROVIDE THE CLOCK
RATE?
ANS. A MODEM OR CSU/DSU
120.p WHICH DEVICES ARE CONSIDERED DTE DEVICES THAT ACCEPT THE CLOCK RATE?
ANS/ CISCO ROUTERS ARE DTE DATA TERMINAL EQUIPMENT
121.p IF ROUTERS ARE GOING TO BE CONFIGURED DCE DEVICE WHAT MUST BE SET ON
THE ROUTER INTERFACE?
ANS. A CLOCK RATE MUST BE SET ON THE ROUTER INTERFACE.
122.p CONFIGURATION ON ANY INTERFACE ON THE ROUTER MUST BE ACCOMPLISHED
IN WHAT MODE?
ANS. MUST BE ACCOMPLISHED IN GLOBAL CONFIGURATION MODE.
123.p ENTER THE FIVE STEPS TO CONFIGURE AN INTERFACE.
ANS. THE FIVE STEPS TO CONFIGURE AN INTERFACE:
1.p SPECIFY THE TYPE OF INTERFACE Router (config)#
SPECIFY A DESC. Router (config-if)#
2.p CONFIG IP ADD AND SUBNET MK Router (config-if)#
3.p SET CLOCK RATE Router (cnfig-if)#
4.p ENABLE INTERFACE Router (config-if)#
124.p WHAT COMMAND IS USED IN ORDER TO TURN OFF AN INTERFACE FOR
MAINTENANCE OR TROUBLESHOOTING?
ANS. THE COMMAND IS@@