Home / Computer Science / Computer Networking :: IOS and Security Device Manager

Computer Science :: Computer Networking

  1. Which command will show you whether a DTE or a DCE cable is plugged into serial 0?

  2. A.

     sh int s0

    B.

     sh int serial 0

    C.

     show controllers serial 0

    D.

     show serial 0 controllers


  3. You want to totally reinitialize the router and replace the current running-config with the current startup-config. What command will you use?

  4. A.

     replace run start

    B.

     copy run start

    C.

     copy start run

    D.

     reload


  5. If you delete the contents of NVRAM and reboot the router, what mode will you be in?

  6. A.

     Privileged mode

    B.

     Global mode

    C.

     Setup mode

    D.

     NVRAM loaded mode


  7. What is the problem with an interface if you type show interface serial 0 and receive the following message? "Serial0 is administratively down, line protocol is down."

  8. A.

     The keepalives are different times.

    B.

     The administrator has the interface shut down.

    C.

     The administrator is pinging from the interface.

    D.

     No cable is attached.


  9. Which of the following is true regarding access lists applied to an interface?

  10. A.

     You can place as many access lists as you want on any interface until you run out of memory.

    B.

     You can apply only one access list on any interface.

    C.

     One access list may be configured, per direction, for each layer 3 protocol configured on an interface.

    D.

     You can apply two access lists to any interface.


  11. Which command would you use to apply an access list to a router interface?

  12. A.

     ip access-list 101 out

    B.

     access-list ip 101 in

    C.

     ip access-group 101 in

    D.

     access-group ip 101 in


  13. Which of the following is an example of a standard IP access list?

  14. A.

     access-list 110 permit host 1.1.1.1

    B.

     access-list 1 deny 172.16.10.1 0.0.0.0

    C.

     access-list 1 permit 172.16.10.1 255.255.0.0

    D.

     access-list standard 1.1.1.1


  15. You need to create an access list that will prevent hosts in the network range of 192.168.160.0 to 192.168.191.0. Which of the following lists will you use?

  16. A.

     access-list 10 deny 192.168.160.0 255.255.224.0

    B.

     access-list 10 deny 192.168.160.0 0.0.191.255

    C.

     access-list 10 deny 192.168.160.0 0.0.31.255

    D.

     access-list 10 deny 192.168.0.0 0.0.31.255


  17. You are working on a router that has established privilege levels that restrict access to certain functions. You discover that you are not able to execute the command show running-configuration. How can you view and confirm the access lists that have been applied to the Ethernet 0 interface on your router?

  18. A.

     show access-lists

    B.

     show interface Ethernet 0

    C.

     show ip access-lists

    D.

     show ip interface Ethernet 0


  19. What command will permit SMTP mail to only host 1.1.1.1?

  20. A.

     access-list 10 permit smtp host 1.1.1.1

    B.

     access-list 110 permit ip smtp host 1.1.1.1

    C.

     access-list 10 permit tcp any host 1.1.1.1 eq smtp

    D.

     access-list 110 permit tcp any host 1.1.1.1 eq smtp