and Answers All Correct
Which procedure is used to access a Cisco 2960 switch when performing an initial
configuration in a secure environment? - Answer-Use the console port to locally access
the switch from a serial or USB interface of the PC.
What criterion must be followed in the design of an IPv4 addressing scheme for end
devices? - Answer-Each IP address must be unique within the local network.
A network administrator needs to keep the user ID, password, and session contents
private when establishing remote CLI connectivity with a switch to manage it. Which
access method should be chosen? - Answer-SSH
Which interface allows remote management of a Layer 2 switch? - Answer-the switch
virtual interface
What is a result of using the service password-encryption command on a Cisco network
device? - Answer-All passwords in the configuration are not shown in clear text when
viewing the configuration.
Tab - Answer-Completes abbreviated commands and parameters
Ctrl-R - Answer-returns directly to the privileged EXEC mode
Up Arrow - Answer-scrolls backwards through previously entered commands
Ctrl-Z - Answer-cancels any command currently being entered and returns directly to
privileged EXEC mode
Ctrl-C - Answer-Redisplays, on a new line, the command currently being typed
A network administrator is planning an IOS upgrade on several of the head office
routers and switches. Which three questions must be answered before continuing with
the IOS selection and upgrade? (Choose three.) - Answer-1. What models of routers
and switches require upgrades?
2. Do the routers and switches have enough RAM and flash memory for the proposed
IOS versions?
3. What features are required for the devices?