Sunteți pe pagina 1din 6

English

1.
ccna1chapter2p3
Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was
issued, but the ping was not successful. Other switches in the same network can ping this
gateway. What is a possible reason for this?
1. The default gateway address must be 192.168.10.1.
2. The ip default-gateway command has to be issued in the VLAN interface configuration
mode.
3. The VLAN IP address and the default gateway IP address are not in the same network.
4. The no shutdown command was not issued for VLAN 1. = El Comando no shutdown no fue
emitido para la VLAN 1
5. The local DNS server is not functioning correctly.
2.While trying to solve a network issue, a technician made multiple changes to the current
router configuration file. The changes did not solve the problem and were not saved. What
action can the technician take to discard the changes and work with the file in NVRAM?
2. Tratando de resolver una cuestion de red, un tecnico hace multiples cambios al archivo de
configuracion del actual router. Los cambios no resolvieron el problema no fueron salvados.
Que accion puede el tecnico tomar para descartar los cambios y trabajar con el archivo de la
NVRAM?
1. Issue the reload command without saving the running configuration.
Emitir el Comando reload sin salvar el running confiration
2. Close and reopen the terminal emulation software.
3. Delete the vlan.dat file and reboot the device.
4. Issue the copy startup-config running-config command.
3.Why is it important to configure a hostname on a device?
3. Porque es importante configurar un nombre sobre un dispositivo?
1. to allow local access to the device through the console port
2. a Cisco router or switch only begins to operate when its hostname is set
3. to identify the device during remote access (SSH or telnet)
Para indentificar al dispositivo durante un acceso remoto (SSH or Telnet)
4. a hostname must be configured before any other parameters
4.Which procedure is used to access a Cisco 2960 switch when performing an initial
configuration in a secure environment?
4.Cual procedimiento es usado para acceder a un switch Ciso 2960 cuando ejecutamos una
configuracion en ambiente seguro
1. Use the console port to locally access the switch from a serial or USB interface of the PC.
Utilizar el puerto de consola para un acceso local del switch desde una interfaz serial o USB
de la PC
2. Use Secure Shell to remotely access the switch through the network.
3. Use Telnet to remotely access the switch through the network.
4. Use the AUX port to locally access the switch from a serial or USB interface of the PC.

5.What criterion must be followed in the design of an IPv4 addressing scheme for end devices?
5. Que criterio debe ser seguido en el diseo de un esquema de direccionamiento IPv4 para un
dispositivo final
1. Each local host should be assigned an IP address with a unique network component.
2. Each IP address must match the address that is assigned to the host by DNS.
3. Each IP address must be unique within the local network.
Cada direccionj de IP debe ser unico dentro la red local
4. Each IP address needs to be compatible with the MAC address.

6.A network administrator needs to keep the user ID, password, and session contents private
when establishing remote CLI connectivity with a switch to manage it. Which access method
should be chosen?
6. Un adminstrador de red necesita mantener la identificacion de usurio, password y el
contenido de su sesin privada cuando establesca un conexion remota con un switch para
administrarlo. Que mtodo de acceso debera ser elegido?.
1. AUX
2. SSH
3. Console
4. Telnet
7.Which interface allows remote management of a Layer 2 switch?
7 Que interface permite la administracion remota de un switch de capa 2?
1. the switch virtual interface
la interface switch virtual
2. the console port interface
3. the AUX interface
4. the first Ethernet port interface
8.What is a result of using the service password-encryption command on a Cisco network
device?
8. que es el resultado de uso del commando service password-encryption en un dispositivo de
red CISCO
1. All passwords in the configuration are not shown in clear text when viewing the
configuration.
Todos los passwords en la configuracion no son mostrados en texto calro cuando se ve la
configuracion
2. The command encrypts the banner message.
3. The command encrypts the enable mode password.
4. A network administrator who later logs into the device will be required to enter an
administrator password in order to gain access to the Cisco device.
9.Match the difinitions to their respective CLI hot keys and shortcuts (Not all options are used)
9. Coincidir las definiciones de su respective CLI hot key y atajos (No todas las opciones son
usadas)
Tab -> Completes abbreviated commands and parameters
Ctrl-R -> returns directly to the privileged EXEC mode
Up Arrow -> scrolls backwards through previously entered commands

Ctrl-Z -> cancels any command currently being entered and returns directly to privileged EXEC
mode
Ctrl-C -> Redisplays, on a new line, the command currently being typed

10.A network administrator is planning an IOS upgrade on several of the head office routers
and switches. Which three questions must be answered before continuing with the IOS
selection and upgrade? (Choose three.)
10. Un administrador de red esta panificando realizar al IOS varias actualizaciones en oficina
central routers y switches. Cual de tres preguntas deben ser respondidas antes de continuar
con la actulizacion y seleccin de IOS? (Elija tres)
1. What models of routers and switches require upgrades?
Que modelos de routers y switches requieren actualizaciones?
2. Do the routers and switches have enough RAM and flash memory for the proposed IOS
versions?
Los routers y switches tienen suficiente RAM y flash memory para las versiones propuestas
de IOS?
3. What ports are installed on the routers and switches?
4. Are the devices on the same LAN?
5. What features are required for the devices?
Que caracterisiticas son requeridos para este dispositivo?
6. Do the devices have enough NVRAM to store the IOS image?

11. What benefit does DHCP provide to a network?


11. Que beneficios provee DHCP para una red?
1. Hosts can connect to the network and get an IP address without manual configuration.
Los hosts pueden conectarse a la red y obtener una direccion ip sin configurar maualmente
una IP
2. Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP
and has static assignments.
3. DHCP allows users to refer to locations by a name rather than an IP address.
4. Hosts always have the same IP address and are therefore always reachable.

12.Which two functions are provided to users by the context-sensitive help feature of the Cisco
IOS CLI? (Choose two.)
12. Cual de las dos funciones son proporcionadas a los usuarios mediante las caractersticas
de ayuda sensible al contexto de la CLI de CISCO IOS (Elija dos).
1. providing an error message when a wrong command is submitted
2. allowing the user to complete the remainder of an abbreviated command with the TAB key
3. displaying a list of all available commands within the current mode
Muestra una lista de todos los comandos disponibles dentro el modo actual
4. selecting the best command to accomplish a task
5. determining which option, keyword, or argument is available for the entered command
Determina cual opcin, clave o argumento est disponible para el comando ingresado.

13.A router has a valid operating system and a configuration stored in NVRAM. When the
router boots up, which mode will display?
13. Un router tiene un Sistema Operativo valido y una configuracion almacenada en NVRAM.
Cuando el router bootea cual modo ser mostrado.
1. global configuration mode
2. user EXEC mode
Usuario EXEC modo
3. setup mode
4. ROM monitor mode
14.Which two features are characteristics of flash memory? (Choose two.)
14. Cual de dos caracteristicas son caracteristicas de la memoria flash? (elija dos)
1. Flash receives a copy of the IOS from RAM when a device is powered on.
2. Flash provides nonvolatile storage.
Flash proporciona un almacenamiento no volatil
3. The contents of flash may be overwritten.
El contenido de un flash puede ser sobrescrito.
4. Flash is a component in Cisco switches but not in Cisco routers.
5. The contents of flash may be lost during a power cycle.
15.Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes
and interfaces that can be protected with passwords. (Choose three.)
15. Passsword se pueden usar para restringir el acceso total o parte del IOS de CISCO.
Seleccione los modos e interfaces que pueden ser protegidos con passwords (Elija tres)
1.
2.
3.
4.
5.
6.

boot IOS mode


Ethernet interface
privileged EXEC mode
VTY interface
console interface
router configuration mode

16.Why would a Layer 2 switch need an IP address?


16. Porque podra un switch de capa 2 necesitar una direccin de IP?
1.
2.
3.
4.

to enable the switch to send broadcast frames to attached PCs


to enable the switch to function as a default gateway
to enable the switch to receive frames from attached PCs
to enable the switch to be managed remotely
Para activar el switch para ser administrado remotamente

17.What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?
17. que est tratando de determinar un usuario cuando est emitiendo el comando ping
10.1.1.1 en una PC?
1. if there is connectivity with the destination device
Si hay conectividad con el dispositivo de destino
2. what type of device is at the destination
3. if the TCP/IP stack is functioning on the PC without putting traffic on the wire
4. the path that traffic will take to reach the destination
18.What command can be used on a Windows PC to see the IP configuration of that computer?

18. que commando puede ser usado en una PC para ver la configuracion IP de esa
computadora?
1.
2.
3.
4.

ping
show interfaces
show ip interface brief
ipconfig

19.Which statement is true about the running configuration file in a Cisco IOS device?
19.Cual de las declaraciones es verdad acerca del archivo running configuration en un
dispositivo de CISCO?
1. It should be deleted using the erase running-config command.
2. It is automatically saved when the router reboots.
3. It affects the operation of the device immediately when modified.
Ello afecta la operacion del dispositivo inmediatamente cuando es modificado
4. It is stored in NVRAM.
20.Match the description to the common IOS CLI access method (Not all options are used)
20. Coincidir con la descripcin del mtodo de acceso comn a CLI de IOS (No todas las
opciones son usadas)
Virtual interface Target (Y)->It requires an active network connection. (Y)
AUX port Target (X) -> It connects through dialup connections. (X)
AUX port Target (Y) -> It is not supported on Catalyst switch devices. (Y)
Virtual interface Target (X) -> It uses Telnet or SSH protocols for access. (X)
Console port Target (X) -> It displays startup, debugging, and error messages by default. (X)
Console port Target (Y) -> It can be used to restore an out-of-box configuration on a switch or
router. (Y)
21.Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.)
21. Cual de dos caractersticas son permitidos como parte de un nombre de un dispositivo de
CISCO? (Elija dos)
1.
2.
3.
4.
5.

tab
space
question mark
numbers
underline

22.A new network administrator has been asked to enter a banner message on a Cisco device.
What is the fastest way a network administrator could test whether the banner is properly
configured?
22. Un Nuevo administrador de red se le ha pedido ingresar un mensaje al dispositivo Cisco.
Que cual es el camino ms rpido que podra tomar el administrador de red si el banner est
configurado apropiadamente?
1. Power cycle the device.
2. Enter CTRL-Z at the privileged mode prompt.

3. Exit global configuration mode.


4. Exit enable mode and press Enter.
Salir del modo enable y presionar enter
5. Reboot the device.

S-ar putea să vă placă și