Why would a technician enter the command copy startup-config running-config?

As soon as configuration commands are entered into a router, they modify the device immediately. Running configuration files can not be deleted nor are they saved automatically.

Show

2. Which two statements are true regarding the user EXEC mode? (Choose two.)

  • A. The device prompt for this mode ends with the ">" symbol.

  • B. Global configuration mode can be accessed by entering the enable command.

  • C. All router commands are available.

  • D. Only some aspects of the router configuration can be viewed.

  • D. Interfaces and routing protocols can be configured.

Explanation

User EXEC mode limits access to some show and debug commands. It is the first level of user interface encountered when configuring a router and is intended for investigation of certain functions of the device. The User EXEC prompt is identified with the ">" symbol.

3. Which type of access is secured on a Cisco router or switch with the enable secret command?

  • A. Console line

  • B. Privileged EXEC

  • C. Virtual terminal

  • D. AUX port

Explanation

The enable secret command secures access to the privileged EXEC mode of a Cisco router or switch.

4. What is the default SVI on a Cisco switch?

  • A. VLAN100

  • B. VLAN999

  • C. VLAN99

  • D. VLAN1

Explanation

Layer 2 switches use switch virtual interfaces (SVIs) to provide a means for remote access over IP. The default SVI on a Cisco switch is VLAN1.

5. When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

  • A. The hostname should be fewer than 64 characters in length

  • B. The hostname should contain no spaces

  • C. The hostname should end with a special character

  • D. The hostname should begin with a letter

  • E. The hostname should be written in all lower case characters

Explanation

A hostname can be configured with upper or lower case characters and should end with a letter or digit, not a special character. A hostname should start with a letter and no space is allowed for a hostname.

6. What is the function of the shell in an OS?

  • A. It provides dedicated firewall services.

  • B. It provides the intrusion protection services for the device.

  • C. It interacts with the device hardware.

  • D. It interfaces between the users and the kernel.

Explanation

Most operating systems contain a shell and a kernel. The kernel interacts with the hardware and the shell interfaces between the kernel and the users.

7. A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

  • A. Privileged EXEC mode

  • B. Global configuration mode

  • C. Setup mode

  • D. User EXEC mode

Explanation

If a Cisco IOS device has a valid IOS and a valid configuration file, it will boot into user EXEC mode. A password will be required to enter privileged EXEC mode.

8. An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

  • A. Copy the information in the startup configuration file to the running configuration.

  • B. Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

  • C. Copy the running configuration to the startup configuration file.

  • D. Reload the device and type yes when prompted to save the configuration.

Explanation

Changes to router and switch configurations take effect as soon as the command is entered. For this reason, it is very important that changes to live production devices are always carefully planned before being implemented. If commands are entered that render the device unstable or inaccessible, the device may have to be reloaded, resulting in network downtime.

9. Which memory location on a Cisco router or switch will lose all content when the device is restarted?

  • A. ROM

  • B. NVRAM

  • C. Flash

  • D. RAM

Explanation

RAM is volatile memory and will lose all contents if the router or switch is restarted or shutdown.

10. Why would a technician enter the command copy startup-config running-config?

  • A. To copy an existing configuration into RAM

  • B. To save an active configuration to NVRAM

  • C. To copy an existing configuration into RAM

  • D. To make a changed configuration the new startup configuration

Explanation

Usually, changes are made to a running configuration in RAM and copied to NVRAM. However, in this case, the technician wants to copy a previously saved configuration from NVRAM into RAM in order to make changes to it.

11. Which functionality is provided by DHCP?

  • A. Automatic assignment of an IP address to each host

  • B. Translation of IP addresses to domain names

  • C. End-to-end connectivity test

  • D. Remote switch management

Explanation

DHCP provides dynamic and automatic IP address assignment to hosts.

12. Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

  • A. Providing an error message when a wrong command is submitted

  • B. Determining which option, keyword, or argument is available for the entered command

  • C. Selecting the best command to accomplish a task

  • D. Displaying a list of all available commands within the current mode

  • E. Allowing the user to complete the remainder of an abbreviated command with the TAB key

Explanation

Context-sensitive help provides the user with a list of commands and the arguments associated with those commands within the current mode of a networking device. A syntax checker provides error checks on submitted commands and the TAB key can be used for command completion if a partial command is entered.

13. Which memory location on a Cisco router or switch stores the startup configuration file?

  • A. RAM

  • B. NVRAM

  • C. Flash

  • D. ROM

Explanation

The startup configuration file of a Cisco router or switch is stored in NVRAM, which is nonvolatile memory.

14. To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?

  • A. 10.0.0.0

  • B. 10.1.100.0

  • C. 10.1.100.32

  • D. 10.1.0.0

Explanation

The purpose of a subnet mask is to separate the network portion of the address from the host portion of the IP address. The network portion of the IP address is identified by all binary 1s in the subnet mask. Using a subnet mask of 255.255.0.0 identifies the first two octets of the IP address as the network portion.

Which commands will copy your startup configuration to your running configuration?

Use the copy nvram:startup-config {ftp: | rcp: | tftp:} command to copy the startup configuration file to a network server. The configuration file copy can serve as a backup copy. Use the copy system:running-config nvram:startup-config command to copy the running configuration to the startup configuration.

What is running

The device uses the startup configuration (startup-config) during device startup to configure the software features. The running configuration (running-config) contains the current changes that you make to the startup-configuration file. The two configuration files can be different.

What is the effect of using the rotor copy running

Effect of using the router# copy running-config startup-config command on a router: The effect of using the router copy running configuration start config on the router is that the content of NVRAM will change.

What is meant by startup configuration?

The startup configuration is the configuration your devices run on when they reboot or power up. The running configuration is the current version of the configuration file the device runs on.