Practice–Cisco Build a Small Cisco Network

Cisco Network Switch Virtual Interface Configuration Switches and Routers

The following activities provide practice with the topics introduced in this chapter.

Packet Tracer Activities

Packet Tracer—Implement Basic Connectivity (19.1.4)

Packet Tracer—Configure Initial Router Settings (19.2.4)

Packet Tracer—Configure SSH (19.3.6)

Packet Tracer—Build a Switch and Router Network (19.4.4)

Check Your Understanding Questions

Complete all the review questions listed here to test your understanding of the topics and concepts in this chapter. Appendix A, “Answers to the ‘Check Your Understanding‛ Questions,” lists the answers.

1. Which connection provides a secure CLI session with encryption to a Cisco switch?

  1. A console connection
  2. A Telnet connection
  3. An AUX connection
  4. An SSH connection

2. Which interface is the default SVI on a Cisco switch?

  1. VLAN 1
  2. FastEthernet 0/1
  3. VLAN 99
  4. GigabitEthernet 0/1

3. On which switch interface would an administrator configure an IP address so that the switch can be managed remotely?

  1. VLAN 1
  2. Console 0
  3. FastEthernet 0/1
  4. Vty 0

4. What is the effect of using the Router# copy running-config startup-config command on a router?

  1. The contents of flash will change.
  2. The contents of ROM will change.
  3. The contents of NVRAM will change.
  4. The contents of RAM will change.

5. What is one difference between using Telnet or SSH to connect to a network device for management purposes?

  1. Telnet uses UDP as the transport protocol, whereas SSH uses TCP.
  2. Telnet does not provide authentication, whereas SSH provides authentication.
  3. Telnet sends the username and password in plaintext, whereas SSH encrypts the username and password.
  4. Telnet supports a host GUI, whereas SSH supports only a host CLI.

6. A network technician is statically assigning an IP address to a PC. The subnet mask is 255.255.255.0. The default gateway is 172.16.10.1. What would be a valid IP address to assign to the host?

  1. 172.16.1.10
  2. 172.16.10.1
  3. 172.16.10.100
  4. 172.16.10.255

7. What happens when the transport input ssh command is entered on the switch vty lines?

  1. The switch requires a username/password combination for remote access.
  2. The switch requires remote connection via proprietary client software.
  3. The SSH client on the switch is enabled.
  4. Communication between the switch and remote users is encrypted.

8. Company policy requires using the most secure method to safeguard access to the privileged EXEC and configuration mode on the routers. The privileged EXEC password is trustknow1. Which of the following router commands achieves the goal of providing the highest level of security?

  1. enable password trustknow1
  2. secret password trustknow1
  3. service password-encryption
  4. enable secret trustknow1

9. Which command can be used to encrypt all passwords in the configuration file?

  1. enable secret
  2. password
  3. service password-encryption
  4. enable password

Related Posts

Leave a Reply

Your email address will not be published. Required fields are marked *