Cisco Systems 2 Network Router User Manual


 
640 - 607
Leading the way in IT testing and certification tools, www.testking.com
- 112 -
Incorrect Answers:
A is incorrect; IOS images are stored on a tftp server and not a ftp server. This is not a valid command.
B is incorrect; IOS images are stored on a tftp server and not a ftp server. This is not a valid command.
C is incorrect; the copy flash tftp command actually copies the IOS from the router to the tftp server. This is the
exact opposite of what the question asked.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) pages 138-140.
Q. 180
When you enter router password during the setup dialogue what is the difference between enable secret
passwords?
A. The enable password is encrypted.
B. The enable secret password uses IPSec password authentication.
C. The enable secret password cannot be seen as clear text when viewing the configuration.
D. The enable secret password acts as a backup in case the enable password is compromised.
Answer: C
Explanation: The enable secret password is always encrypted and can’t be reverse decrypted for display.
Incorrect Answers:
A is incorrect; the enable secret password is Always encrypted, the enable password is optionally encrypted.
B is incorrect; IPSEC is not used for the password.
D is incorrect; enable secret password would act as a backup if the secret password was lost and forgotten, or
for some reason failed to be recognized.
Steve McQuerry. Interconnecting Cisco Network Devices. (Cisco Press: 2000) page 86
Q. 181
Which three commands are used to configure information into RAM on a router. (Choose three)
A. Configure memory
B. Configure terminal
C. Configure overwrite
D. Copy TFTP startup-Config
E. Copy running-Config startup-Config
F. Copy startup-Config running-Config
Answer: A, B, F
Explanation: There are a number of commands that can be used to ensure information is configured into the
RAM of a routers. The one that is used most commonly is the copy startup-config running-config command.