background image
708 Appendix A: Answers to the "Do I Know This Already?" Quizzes and Q&A Sections
35
Name two commands used to view the configuration to be used at the next reload of the
router. Which one is a more recent addition to the IOS?
show config and show startup-config. show startup-config is the newer one and,
hopefully, is easier to remember.
36
Name two commands used to view the configuration that is currently used in a router.
Which one is a more recent addition to the IOS?
write terminal and show running-config. show running-config is the newer command
and, hopefully, is easier to remember.
37
True or False: The copy startup-config running-config command always changes the
currently used configuration for this router to exactly match what is in the startup
configuration file. Explain.
False. Some configuration commands do not replace an existing command but are simply
added to a list of related commands. If such a list exists, the copy startup-config running-
config
command simply adds those to the end of the list. Many of these lists in a router
configuration are order-dependent.
Answers to the Chapter 3 "Do I Know This Already?" Quiz
1
Name the seven layers of the OSI model.
Application (Layer 7), presentation (Layer 6), session (Layer 5), transport (Layer 4),
network (Layer 3), data link (Layer 2), and physical (Layer 1).
2
What is the main purpose(s) of Layer 3?
The network layer defines logical addressing and routing as a means to deliver data across
an entire network. IP and IPX are two examples of Layer 3 equivalent protocols.
3
What is the main purpose(s) of Layer 2?
The data link layer defines addressing specific to a particular medium as part of the means
to provide delivery of data across that medium. It also includes the protocols used to
determine what device(s) access the media at any point in time.
4
What OSI layer typically encapsulates using both a header and a trailer?
The data link layer. The trailer typically includes a frame check sequence (FCS), which is
used to perform error detection.
5
Describe the features required for a protocol to be considered connectionless.
Unordered low-overhead delivery of data from one host to another is the service provided
in most connectionless protocol services.
apA.fm Page 708 Monday, March 20, 2000 5:24 PM