But if you find the same answers for all the Module anywhere in the internet.
And if you have an Answers are correct 100% or if you find an answer, What is wrong in this blog. please send me. (Post in blog or Send Email )
Because,I will update the blog…

Sunday, April 21, 2013

CCNA 2 - Module 2 Exam Version 3.1 Router and Routing Basics

CCNA 2 - Module 2 Exam Version 3.1 Router and Routing Basics

1. Which keystrokes can be used to return to the privileged mode from the interface configuration mode?
• Ctrl-P
• Ctrl-Shift-6, then X
Ctrl-Z
• Esc

2. Which tasks can be performed in the ROM monitor mode? (Choose two.)
recover from system failures
• create startup configuration files
recover from lost passwords
• configure IP addresses on all router interfaces
• perform high level diagnostics

3. When the router output is being viewed through a terminal program, which statements are true regarding the --More-- prompt at the bottom of the router display? (Choose two.)
• Press the Spacebar to display the next line.
Press the Spacebar to view the next screen.
• Press the PgDn key to view the next screen.
Press the Enter key to display the next line.
• Press the Enter key to view the next screen.

4. After the active IOS image has been loaded into RAM from flash memory, which commands could be used be used to display the file name of the active IOS? (Choose two.)
• Router# show IOS
Router# show flash
• Router# show nvram
Router# show version
• Router# show startup-config
• Router# show running-config

5. Which of the following statements concerning router interface modes are correct? (Choose three.)
User EXEC mode provides commands to monitor router operation.
• Privileged EXEC mode only provides commands to change or configure router operation.
• Password protected configuration modes can be accessed from either user EXEC or privileged EXEC modes.
On a router with the name Core1, the prompt indicating privileged EXEC mode is Core1#.
• The command to enter privileged EXEC mode is Router# enable.
A username and password may be required to enter privileged EXEC mode.

6. Cisco IOS software is separated into two levels as a security feature. What are those two levels? (Choose two.)
• global
privileged
• local
user
• interface

7. Which tasks can be accomplished by using the command history feature? (Choose two.)
• View a list of commands entered in a previous session.
• Recall up to 15 command lines by default.
Set the command history buffer size.
Recall previously entered commands.
• Save command lines in a log file for future reference.

8. What information about the router and its startup process can be gathered from the output of the show version command? (Choose three.)
the last restart method
• the command buffer contents
• the amount of NVRAM and FLASH used
the configuration register settings
the location from where the IOS loaded

9. What is the default sequence for loading the configuration file?
• NVRAM, FLASH, ROM
• FLASH, TFTP,CONSOLE
NVRAM, TFTP, CONSOLE
• FLASH, TFTP, ROM

10. Which connection method can be used to perform the initial configuration of a router?
use a serial connection of a computer connected to the console port of a router
• telnet to the router through a serial port
• use a vty port through the Ethernet interface
• use a modem connected to the AUX port of the router

11. What baud rate needs to be configured on terminal emulation software to allow a connection to the console port of a router?
• 2400
• 4800
9600
• 14200
• 38400

12. What information does the name of the IOS file provide to the network administrator? (Choose three.)
• the amount of NVRAM required to run the image
the hardware platform the image runs on
• the various software platforms the image can run on
special features and capabilities of the image
• the bandwidth supported by the IOS
where the image executes from and if it has been compressed

13. What does the command sh? return as output if issued at the Router# prompt?
• all show commands allowed in privileged mode
all commands beginning with the letters sh
• an incomplete command error message
• an invalid command error message

14. Which keystroke is used to move to the beginning of a command line?
Ctrl-A
• Ctrl-B
• Esc-A
• Esc-B
• Ctrl-C
• Ctrl-Z

15. Which command takes precedence if the commands enable password and enable secret are both configured on a router?
• enable password
enable secret
• Neither. They are both enabled.
• Neither. They cancel each other out.

16. Which of the following is the correct flow of routines for a router startup?
load bootstrap, load IOS, apply configuration
• load bootstrap, apply configuration, load IOS
• load IOS, load bootstrap, apply configuration, check hardware
• check hardware, apply configuration, load bootstrap, load IOS

17. Under what conditions does the router enter setup mode? (Choose three.)
• immediately after issuing the command Router#erase start
after issuing the command Router#setup
during the initial configuration of a router
after deleting the backup configuration and reloading the router
• after deleting the running configuration

CCNA 2 - Module 2 Exam Version 3.1 Router and Routing Basics
18. Which of the following identifies the correct items needed to initially configure a router?
• 1) DB-9-to-RJ-45 on the PC's serial port
2) a straight through cable
3) the router's console port
• 1) PC's Ethernet port
2) a crossover cable
3) the router's Ethernet port
• 1) DB-9-to-RJ-45 on the PC's serial port
2) a rollover cable
3) the router's Ethernet port
• 1) PC's Ethernet port
2) a rollover cable
3) the router's console port
1) DB-9-to-RJ-45 on the PC's serial port
2) a rollover cable
3) the router's console port

• 1) PC's Ethernet port
2) a rollover cable
3) the router's Ethernet port

19. A network administrator needs to configure a router. Which of the following connection methods requires network functionality to be accessible?
• console
• AUX
Telnet
• modem

No comments :