Quiz-summary
0 of 30 questions completed
Questions:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
Information
CISCO 100-490 Supporting Cisco Routing and Switching Network Devices v3.0 Quiz 03 covered:
CISCO 100-490 Supporting Cisco Routing and Switching Network Devices v3.0
You have already completed the quiz before. Hence you can not start it again.
Quiz is loading...
You must sign in or sign up to start the quiz.
You have to finish following quiz, to start this quiz:
Results
0 of 30 questions answered correctly
Your time:
Time has elapsed
You have reached 0 of 0 points, (0)
Categories
- Not categorized 0%
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- 26
- 27
- 28
- 29
- 30
- Answered
- Review
-
Question 1 of 30
1. Question
Which Cisco IOS mode allows users to view system information, execute diagnostic commands, and perform basic configuration tasks?
Correct
Explanation: Privileged EXEC mode in Cisco IOS allows users to view system information, execute diagnostic commands, and perform basic configuration tasks. It provides access to more commands compared to User EXEC mode and typically requires a password for access.
Incorrect
Explanation: Privileged EXEC mode in Cisco IOS allows users to view system information, execute diagnostic commands, and perform basic configuration tasks. It provides access to more commands compared to User EXEC mode and typically requires a password for access.
-
Question 2 of 30
2. Question
What is the primary purpose of using loopback interfaces in network troubleshooting?
Correct
Explanation: Loopback interfaces are virtual interfaces on network devices that are used primarily for testing and troubleshooting purposes. They provide a stable interface for testing and troubleshooting network protocols without relying on physical connections or interfaces.
Incorrect
Explanation: Loopback interfaces are virtual interfaces on network devices that are used primarily for testing and troubleshooting purposes. They provide a stable interface for testing and troubleshooting network protocols without relying on physical connections or interfaces.
-
Question 3 of 30
3. Question
Which layer of the OSI model is responsible for logical addressing and routing of packets?
Correct
Explanation: The Network layer (Layer 3) of the OSI model is responsible for logical addressing and routing of packets. It provides services such as logical addressing, routing, and path determination to ensure that data is delivered between source and destination devices.
Incorrect
Explanation: The Network layer (Layer 3) of the OSI model is responsible for logical addressing and routing of packets. It provides services such as logical addressing, routing, and path determination to ensure that data is delivered between source and destination devices.
-
Question 4 of 30
4. Question
Which Cisco device is typically used to connect multiple network segments together and forward traffic based on MAC addresses?
Correct
Explanation: Cisco Catalyst Switches are commonly used to connect multiple network segments together within a LAN environment and forward traffic based on MAC addresses at Layer 2 of the OSI model.
Incorrect
Explanation: Cisco Catalyst Switches are commonly used to connect multiple network segments together within a LAN environment and forward traffic based on MAC addresses at Layer 2 of the OSI model.
-
Question 5 of 30
5. Question
What is the primary purpose of documentation in network administration?
Correct
Explanation: Documentation in network administration serves as a record of changes made to network configurations, providing accountability, compliance, and facilitating troubleshooting by allowing administrators to review past changes and configurations.
Incorrect
Explanation: Documentation in network administration serves as a record of changes made to network configurations, providing accountability, compliance, and facilitating troubleshooting by allowing administrators to review past changes and configurations.
-
Question 6 of 30
6. Question
Which diagnostic tool is used to identify the route that packets take to reach their destination?
Correct
Explanation: Traceroute is used to identify the route that packets take to reach their destination by sending packets with increasing TTL values and recording the IP addresses of routers along the path. It helps diagnose network connectivity issues and identify network hops.
Incorrect
Explanation: Traceroute is used to identify the route that packets take to reach their destination by sending packets with increasing TTL values and recording the IP addresses of routers along the path. It helps diagnose network connectivity issues and identify network hops.
-
Question 7 of 30
7. Question
Which remote access protocol is commonly used to securely connect to network devices for configuration and management?
Correct
Explanation: SSH (Secure Shell) is commonly used to securely connect to network devices for configuration and management over the network. It provides encryption and secure authentication, protecting sensitive information during remote access sessions.
Incorrect
Explanation: SSH (Secure Shell) is commonly used to securely connect to network devices for configuration and management over the network. It provides encryption and secure authentication, protecting sensitive information during remote access sessions.
-
Question 8 of 30
8. Question
What is the purpose of VLANs (Virtual Local Area Networks) in network design?
Correct
Explanation: VLANs are used to segment a network into smaller broadcast domains, reducing broadcast traffic and improving network performance and security by logically separating devices into different VLANs.
Incorrect
Explanation: VLANs are used to segment a network into smaller broadcast domains, reducing broadcast traffic and improving network performance and security by logically separating devices into different VLANs.
-
Question 9 of 30
9. Question
What is the purpose of the “interface configuration mode” in Cisco IOS?
Correct
Explanation: The “interface configuration mode” in Cisco IOS allows administrators to modify interface parameters such as IP addresses, subnet masks, and other interface-specific settings. It is used to configure individual network interfaces on a device.
Incorrect
Explanation: The “interface configuration mode” in Cisco IOS allows administrators to modify interface parameters such as IP addresses, subnet masks, and other interface-specific settings. It is used to configure individual network interfaces on a device.
-
Question 10 of 30
10. Question
What is the purpose of VLANs (Virtual Local Area Networks) in network design?
Correct
Explanation: VLANs are used to segment a network into smaller broadcast domains, reducing broadcast traffic and improving network performance and security by logically separating devices into different VLANs.
Incorrect
Explanation: VLANs are used to segment a network into smaller broadcast domains, reducing broadcast traffic and improving network performance and security by logically separating devices into different VLANs.
-
Question 11 of 30
11. Question
Which layer of the OSI model is responsible for ensuring reliable end-to-end communication by providing error detection and correction?
Correct
Explanation: The Transport layer (Layer 4) of the OSI model is responsible for ensuring reliable end-to-end communication by providing error detection and correction, flow control, and data segmentation.
Incorrect
Explanation: The Transport layer (Layer 4) of the OSI model is responsible for ensuring reliable end-to-end communication by providing error detection and correction, flow control, and data segmentation.
-
Question 12 of 30
12. Question
When troubleshooting network issues, why is it important to identify and isolate the problem before implementing a solution?
Correct
Explanation: Identifying and isolating the problem before implementing a solution helps minimize disruption to network services by ensuring that the root cause of the issue is accurately identified and addressed, reducing the likelihood of unintended consequences or additional problems.
Incorrect
Explanation: Identifying and isolating the problem before implementing a solution helps minimize disruption to network services by ensuring that the root cause of the issue is accurately identified and addressed, reducing the likelihood of unintended consequences or additional problems.
-
Question 13 of 30
13. Question
Which mode in Cisco IOS allows users to execute diagnostic commands, view system information, and perform basic configuration tasks?
Correct
Explanation: Privileged EXEC mode in Cisco IOS allows users to execute diagnostic commands, view system information, and perform basic configuration tasks. It provides access to more commands compared to User EXEC mode and typically requires a password for access.
Incorrect
Explanation: Privileged EXEC mode in Cisco IOS allows users to execute diagnostic commands, view system information, and perform basic configuration tasks. It provides access to more commands compared to User EXEC mode and typically requires a password for access.
-
Question 14 of 30
14. Question
Which diagnostic tool is used to identify the route that packets take to reach their destination?
Correct
Explanation: Traceroute is used to identify the route that packets take to reach their destination by sending packets with increasing TTL values and recording the IP addresses of routers along the path. It helps diagnose network connectivity issues and identify network hops.
Incorrect
Explanation: Traceroute is used to identify the route that packets take to reach their destination by sending packets with increasing TTL values and recording the IP addresses of routers along the path. It helps diagnose network connectivity issues and identify network hops.
-
Question 15 of 30
15. Question
What is the primary purpose of SSH (Secure Shell) in network administration?
Correct
Explanation: The primary purpose of SSH (Secure Shell) in network administration is to securely connect to network devices for configuration and management over the network. It provides encryption and secure authentication, protecting sensitive information during remote access sessions.
Incorrect
Explanation: The primary purpose of SSH (Secure Shell) in network administration is to securely connect to network devices for configuration and management over the network. It provides encryption and secure authentication, protecting sensitive information during remote access sessions.
-
Question 16 of 30
16. Question
What is the primary function of a switch in a network?
Correct
Explanation: Switches are used to forward data packets between devices within the same LAN based on their MAC addresses, enabling communication between devices on the same network segment.
Incorrect
Explanation: Switches are used to forward data packets between devices within the same LAN based on their MAC addresses, enabling communication between devices on the same network segment.
-
Question 17 of 30
17. Question
Which mode in Cisco IOS allows users to configure basic device settings and parameters?
Correct
Explanation: Global configuration mode in Cisco IOS allows users to configure basic device settings and parameters affecting the entire device, such as setting the device hostname, configuring interfaces, and modifying global settings.
Incorrect
Explanation: Global configuration mode in Cisco IOS allows users to configure basic device settings and parameters affecting the entire device, such as setting the device hostname, configuring interfaces, and modifying global settings.
-
Question 18 of 30
18. Question
What is the primary purpose of using a network protocol analyzer (packet sniffer) during troubleshooting?
Correct
Explanation: A network protocol analyzer (packet sniffer) is used to capture and analyze network traffic for debugging and diagnostics. It allows network administrators to inspect individual packets, detect anomalies, and troubleshoot network issues by analyzing packet headers and payloads.
Incorrect
Explanation: A network protocol analyzer (packet sniffer) is used to capture and analyze network traffic for debugging and diagnostics. It allows network administrators to inspect individual packets, detect anomalies, and troubleshoot network issues by analyzing packet headers and payloads.
-
Question 19 of 30
19. Question
Which remote access protocol is commonly used to securely connect to network devices for configuration and management?
Correct
Explanation: SSH (Secure Shell) is commonly used to securely connect to network devices for configuration and management over the network. It provides encryption and secure authentication, protecting sensitive information during remote access sessions.
Incorrect
Explanation: SSH (Secure Shell) is commonly used to securely connect to network devices for configuration and management over the network. It provides encryption and secure authentication, protecting sensitive information during remote access sessions.
-
Question 20 of 30
20. Question
What is the purpose of using OSPF (Open Shortest Path First) as a routing protocol?
Correct
Explanation: OSPF is a link-state routing protocol that uses the shortest path first (SPF) algorithm to find the best path to each network. It is designed for use in large, complex networks and provides fast convergence and scalability.
Incorrect
Explanation: OSPF is a link-state routing protocol that uses the shortest path first (SPF) algorithm to find the best path to each network. It is designed for use in large, complex networks and provides fast convergence and scalability.
-
Question 21 of 30
21. Question
Which command is used to save the running configuration to the startup configuration on a Cisco router?
Correct
Explanation: The command “copy run start” is used to save the running configuration to the startup configuration on a Cisco router. This ensures that the current configuration is retained after a reboot.
Incorrect
Explanation: The command “copy run start” is used to save the running configuration to the startup configuration on a Cisco router. This ensures that the current configuration is retained after a reboot.
-
Question 22 of 30
22. Question
At which layer of the OSI model does the IP protocol operate?
Correct
Explanation: The IP (Internet Protocol) operates at the Network layer (Layer 3) of the OSI model, providing logical addressing and routing of packets between source and destination devices across different networks.
Incorrect
Explanation: The IP (Internet Protocol) operates at the Network layer (Layer 3) of the OSI model, providing logical addressing and routing of packets between source and destination devices across different networks.
-
Question 23 of 30
23. Question
Which command can be used on a Cisco router to display the current routing table?
Correct
Explanation: The command “show ip route” is used on a Cisco router to display the current routing table, which includes information about the routes known to the router and how to reach different network destinations.
Incorrect
Explanation: The command “show ip route” is used on a Cisco router to display the current routing table, which includes information about the routes known to the router and how to reach different network destinations.
-
Question 24 of 30
24. Question
What is a common method for backing up configuration files on Cisco devices?
Correct
Explanation: A common method for backing up configuration files on Cisco devices is using TFTP. Administrators can copy configuration files to and from a TFTP server to ensure they are saved and can be restored if needed.
Incorrect
Explanation: A common method for backing up configuration files on Cisco devices is using TFTP. Administrators can copy configuration files to and from a TFTP server to ensure they are saved and can be restored if needed.
-
Question 25 of 30
25. Question
Which protocol is used to prevent loops in a network with redundant switch paths?
Correct
Explanation: RSTP (Rapid Spanning Tree Protocol) is used to prevent loops in a network with redundant switch paths by creating a loop-free logical topology. It is an improved version of the original Spanning Tree Protocol (STP) with faster convergence times.
Incorrect
Explanation: RSTP (Rapid Spanning Tree Protocol) is used to prevent loops in a network with redundant switch paths by creating a loop-free logical topology. It is an improved version of the original Spanning Tree Protocol (STP) with faster convergence times.
-
Question 26 of 30
26. Question
Which command is used to enter the global configuration mode from privileged EXEC mode on a Cisco device?
Correct
Explanation: The command “config terminal” is used to enter the global configuration mode from privileged EXEC mode on a Cisco device. This mode allows administrators to configure various global settings and parameters for the device.
Incorrect
Explanation: The command “config terminal” is used to enter the global configuration mode from privileged EXEC mode on a Cisco device. This mode allows administrators to configure various global settings and parameters for the device.
-
Question 27 of 30
27. Question
What is the primary purpose of the ping command in network diagnostics?
Correct
Explanation: The ping command is used to test connectivity between two network devices by sending ICMP Echo Request messages and waiting for ICMP Echo Reply messages. It helps diagnose basic network connectivity issues.
Incorrect
Explanation: The ping command is used to test connectivity between two network devices by sending ICMP Echo Request messages and waiting for ICMP Echo Reply messages. It helps diagnose basic network connectivity issues.
-
Question 28 of 30
28. Question
Which protocol is considered insecure for remote access due to its lack of encryption?
Correct
Explanation: Telnet is considered insecure for remote access because it transmits data, including passwords, in plain text without encryption. SSH (Secure Shell) is a more secure alternative that provides encryption and secure authentication.
Incorrect
Explanation: Telnet is considered insecure for remote access because it transmits data, including passwords, in plain text without encryption. SSH (Secure Shell) is a more secure alternative that provides encryption and secure authentication.
-
Question 29 of 30
29. Question
What is the primary purpose of NAT (Network Address Translation) in network design?
Correct
Explanation: NAT (Network Address Translation) translates private IP addresses used within a local network to a public IP address for communication over the internet. This helps conserve public IP addresses and provides an additional layer of security.
Incorrect
Explanation: NAT (Network Address Translation) translates private IP addresses used within a local network to a public IP address for communication over the internet. This helps conserve public IP addresses and provides an additional layer of security.
-
Question 30 of 30
30. Question
Which command is used to display the status of all interfaces on a Cisco router?
Correct
Explanation: The “show ip interface brief” command displays a concise summary of the status of all interfaces on a Cisco router, including their IP addresses and operational state.
Incorrect
Explanation: The “show ip interface brief” command displays a concise summary of the status of all interfaces on a Cisco router, including their IP addresses and operational state.