Last Updated on January 14, 2021 by

Introduction to Networks (version vi.00) – ITN Chapter 2 Exam Beta Answers 2018 100%

Cisco CCNA 1 ITN v6.0 chapter 2 examination beta answers Routing and Switching (R&S) Introduction to Networks (ITN) (Version vi.00) drove year 2017, 2018 and 2019 Full 100%. CCNA 1 has been know equally ITN. The following are the questions test answers. Guarantee Passed 100%. CCNA ane v6.0 chapter 2 exam beta answers has some new update from ITN version 6.0 without beta. Y'all can review all chapter 2 test beta answers. You lot volition get passed scored 100% with this version 6.0. Good Luck for Cisco Netacad ITN v6.0 Exam or ITN Pilot version 6.0 !

This is the first release of this form for the CCNA R&South Introduction to Networks curriculum from Cisco Netacad.com. There are 31 items are available in ITN Affiliate 2 Exam Beta. You lot will get simply selected xviii items which are displayed in random sequence, while you lot take exam with Cisco Netacad.

  1. A network administrator needs to keep the user ID, countersign, and session contents private when establishing remote CLI connectivity with a switch to manage information technology. Which admission method should be chosen?

    • Telnet
    • Console
    • AUX
    • SSH

      Explanation:

  2. Which procedure is used to admission a Cisco 2960 switch when performing an initial configuration in a secure environment?

    • Utilize Telnet to remotely access the switch through the network.
    • Employ the console port to locally access the switch from a series or USB interface of the PC.
    • Use Secure Crush to remotely access the switch through the network​.
    • Use the AUX port to locally access the switch from a series or USB interface of the PC.

      Explanation:

  3. Which two functions are provided to users by the context-sensitive aid feature of the Cisco IOS CLI? (Choose two.)

    • providing an mistake bulletin when a incorrect command is submitted
    • displaying a list of all available commands within the current mode
    • assuasive the user to complete the remainder of an abbreviated command with the TAB primal
    • determining which option, keyword, or statement is available for the entered command
    • selecting the best command to reach a job

      Explanation:

  4. In the bear witness running-config control, which function of the syntax is represented by running-config?

    • the command
    • a keyword
    • a variable
    • a prompt

      Explanation:

  5. Which information does the bear witness startup-config command display?​

    • the IOS epitome copied into RAM
    • the bootstrap program in the ROM
    • the contents of the current running configuration file in the RAM
    • the contents of the saved configuration file in the NVRAM

      Explanation:

  6. Which control or key combination allows a user to return to the previous level in the command bureaucracy?

    • end
    • get out
    • Ctrl-Z
    • Ctrl-C

      Explanation:

  7. How is SSH different from Telnet?

    • SSH makes connections over the network, whereas Telnet is for out-of-band access.
    • SSH provides security to remote sessions past encrypting messages and using user hallmark. Telnet is considered insecure and sends letters in plaintext.
    • SSH requires the use of the PuTTY terminal emulation plan. Tera Term must exist used to connect to devices through the use of Telnet.
    • SSH must be configured over an agile network connexion, whereas Telnet is used to connect to a device from a console connectedness.

      Explanation:

  8. A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password merely no console password. When the router boots upwardly, which mode will display?

    • global configuration way
    • setup mode
    • privileged EXEC mode
    • user EXEC style

      Caption:

  9. What is the role of the kernel of an operating system?

    • It provides a user interface that allows users to request a specific task.
    • The kernel links the hardware drivers with the underlying electronics of a reckoner.
    • Information technology is an application that allows the initial configuration of a Cisco device.
    • The kernel provisions hardware resources to run into software requirements.
      Explanation:

      Operating systems role with a beat, a kernel, and the hardware. The shell interfaces with the users, allowing them to request specific tasks from the device. The kernel provisions resources from the hardware to come across software requirements. The hardware functions by using drivers and their underlying electronics. The hardware represents the physical components of the device.

  10. Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that tin can be protected with passwords. (Choose 3.)

    • VTY interface
    • console interface
    • Ethernet interface
    • kick IOS manner
    • privileged EXEC manner
    • router configuration mode

      Caption:

  11. Which argument is truthful about the running configuration file in a Cisco IOS device?

    • Information technology affects the performance of the device immediately when modified.
    • It is stored in NVRAM.
    • It should be deleted using the erase running-config control.
    • It is automatically saved when the router reboots.

      Caption:

  12. How does the service password-encryption command heighten countersign security on Cisco routers and switches?

    • It encrypts passwords every bit they are sent across the network.
    • It encrypts passwords that are stored in router or switch configuration files.
    • It requires that a user type encrypted passwords to proceeds console admission to a router or switch.
    • Information technology requires encrypted passwords to be used when connecting remotely to a router or switch with Telnet.

      Explanation:

  13. Refer to the exhibit. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?

    Cisco ITN CCNA 1 v6.0 Chapter 1 Exam Beta Answer R&S 2018 2019 001

    Cisco ITN CCNA 1 v6.0 Chapter i Exam Beta Answer R&S 2018 2019 001

    • to display a message when a user accesses the switch
    • to configure switch SW1 and so that simply the users in the Admin grouping can telnet into SW1
    • to force users of the Admin grouping to enter a password for hallmark
    • to configure switch SW1 and so that the message will display when a user enters the enable control

      Explanation:

  14.  Why is information technology important to configure a hostname on a device?

    • a Cisco router or switch just begins to operate when its hostname is fix
    • a hostname must exist configured before any other parameters
    • to identify the device during remote access (SSH or telnet)
    • to permit local access to the device through the panel port

      Explanation:

  15. What are two characteristics of RAM on a Cisco device? (Cull 2.)

    • RAM provides nonvolatile storage.
    • The configuration that is actively running on the device is stored in RAM.
    • The contents of RAM are lost during a power cycle.
    • RAM is a component in Cisco switches but not in Cisco routers.
    • RAM is able to store multiple versions of IOS and configuration files.

      Caption:

  16. Which two host names follow the guidelines for naming conventions on Cisco IOS devices? (Choose two.)

    • Branch2!
    • RM-3-Switch-2A4
    • Floor(fifteen)
    • HO Floor 17
    • SwBranch799

      Explanation:

  17. Which passwords are encrypted with the service password encryption control?

    • all passwords stored in configuration files
    • all passwords sent over the Internet
    • only virtual terminal line passwords
    • merely console line passwords

      Explanation:

  18. Which type of access is secured on a Cisco router or switch with the enable secret command?

    • virtual terminal
    • privileged EXEC
    • AUX port
    • console line

      Explanation:

  19. Which retentivity location on a Cisco router or switch stores the startup configuration file?

    • RAM
    • ROM
    • NVRAM
    • flash

      Caption:

  20. Which memory location on a Cisco router or switch will lose all content when the device is restarted?

    • ROM
    • flash
    • NVRAM
    • RAM

      Explanation:

  21. What is a user trying to decide when issuing a ping 10.1.1.ane command on a PC?

    • if the TCP/IP stack is functioning on the PC without putting traffic on the wire
    • if in that location is connectivity with the destination device
    • the path that traffic will take to accomplish the destination
    • what type of device is at the destination

      Caption:

  22. Why would a Layer 2 switch need an IP address?

    • to enable the switch to ship broadcast frames to attached PCs
    • to enable the switch to function equally a default gateway
    • to enable the switch to exist managed remotely
    • to enable the switch to receive frames from attached PCs

      Caption:

  23. Which interface allows remote management of a Layer 2 switch?

    • the AUX interface
    • the console port interface
    • the switch virtual interface
    • the first Ethernet port interface

      Explanation:

  24. What command can be used on a Windows PC to come across the IP configuration of that calculator?

    • ping
    • ipconfig
    • show interfaces
    • show ip interface brief

      Explanation:

  25. What is a characteristic of a switch virtual interface (SVI)?​

    • Although it is a virtual interface, information technology needs to have physical hardware on the device associated with it.
    • An SVI is created in software and requires a configured IP address and a subnet mask in social club to provide remote access to the switch.
    • SVIs come up preconfigured on Cisco switches.
    • SVIs exercise non require the no shutdown command to become enabled.

      Explanation:

  26. Refer to the exhibit. What three facts can be adamant from the viewable output of the show ip interface brief control? (Cull three.)

    Cisco ITN CCNA 1 v6.0 Chapter 1 Exam Beta Answer R&S 2018 2019 002

    Cisco ITN CCNA 1 v6.0 Chapter i Examination Beta Answer R&S 2018 2019 002

    • Two physical interfaces have been configured.
    • The switch can exist remotely managed.
    • Ane device is attached to a physical interface.
    • Passwords take been configured on the switch.
    • Ii devices are attached to the switch.
    • The default SVI has been configured.

      Caption:

  27. A network administrator for a modest campus network has issued the show ip interface cursory control on a switch. What is the administrator verifying with this command?

    • the status of the switch interfaces and the address configured on interface vlan 1
    • that a specific host on some other network can be reached
    • the path that is used to reach a specific host on another network
    • the default gateway that is used past the switch

      Explanation:

  28. What is the default SVI on a Cisco switch?

    • VLAN1
    • VLAN99
    • VLAN100
    • VLAN999

      Explanation:

  29. To what subnet does the IP address x.i.100.50 belong if a subnet mask of 255.255.0.0 is used?

    • 10.i.0.0
    • 10.0.0.0
    • 10.ane.100.32
    • 10.one.100.0

      Caption:

  30. Which functionality is provided by DHCP?

    • automated assignment of an IP address to each host
    • remote switch management
    • translation of IP addresses to domain names
    • terminate-to-cease connectivity test

      Explanation:

  31. Which IP address is a valid default gateway for a host on the 10.1.100.0/24 network?

    • 10.1.0.ane
    • 10.1.100.254
    • 10.1.1.1
    • x.0.0.1

      Explanation: