Deal of The Day! Hurry Up, Grab the Special Discount - Save 25% - Ends In 00:00:00 Coupon code: SAVE25
Welcome to Pass4Success

- Free Preparation Discussions

Cisco Exam 100-490 Topic 10 Question 47 Discussion

Actual exam question for Cisco's 100-490 exam
Question #: 47
Topic #: 10
[All 100-490 Questions]

To which value is the configuration register changed to bypass the loading of the startup configuration when performing a password recovery on a Cisco device?

Show Suggested Answer Hide Answer
Suggested Answer: D

The configuration register on Cisco devices controls how the device boots up. By changing the configuration register to 0x2142, you instruct the router to bypass the startup configuration file stored in NVRAM. This is crucial in the password recovery process because the passwords are stored in this configuration file.

Procedure for Password Recovery:

1. Break the boot sequence: Power cycle the router (turn off/on). During the boot process, send a 'Break' signal to get into ROMmon mode.

2. Change the configuration register: In ROMmon mode, type confreg 0x2142 and reload the router.

3. Boot without startup-config: The router will boot up, ignoring the saved startup configuration, allowing you to enter privileged EXEC mode without a password.

4. Change the password: Access configuration mode (configure terminal), and change the passwords as needed (enable password, enable secret, etc.).

5. Reset the configuration register: Set the configuration register back to its original value (usually 0x2102).

6. Save changes: Save the new configuration with copy running-config startup-config.


Contribute your Thoughts:

Mitsue
4 months ago
Wow, this question is really bringing out the Cisco geeks in us, isn't it? I'm going with D, but only because I want to see if I can make the device do the Macarena after the recovery.
upvoted 0 times
Omega
3 months ago
I'm going with D as well, let's see if we can make it happen!
upvoted 0 times
...
Isaiah
3 months ago
I think it's D too, let's make that Cisco device dance the Macarena!
upvoted 0 times
...
Freeman
3 months ago
D) 0x2142
upvoted 0 times
...
Zena
3 months ago
C) 0x2122
upvoted 0 times
...
Myra
3 months ago
B) 0x2112
upvoted 0 times
...
Allene
3 months ago
A) 0x2102
upvoted 0 times
...
...
Royce
4 months ago
C'mon, it's got to be B. I mean, who doesn't love a little 0x2112 action when it comes to Cisco devices?
upvoted 0 times
...
Nancey
4 months ago
Option D seems to be the way to go. Although, I heard the password recovery process can sometimes be as hard as trying to hack into the Pentagon's mainframe.
upvoted 0 times
Dannie
3 months ago
Yeah, password recovery on Cisco devices can be tricky, but with the right steps, it can be done.
upvoted 0 times
...
German
3 months ago
I agree, option D is the correct value to bypass the loading of the startup configuration.
upvoted 0 times
...
Verda
3 months ago
D) 0x2142
upvoted 0 times
...
Boris
4 months ago
Yeah, I agree. It's 0x2142.
upvoted 0 times
...
Rosalind
4 months ago
I think D is the correct answer.
upvoted 0 times
...
...
Vanda
4 months ago
Hmm, I'm pretty sure it's 0x2142. Gotta love those Cisco password recovery tricks!
upvoted 0 times
Catherin
4 months ago
User 2: Yeah, changing the configuration register to 0x2142 is key for bypassing the startup config.
upvoted 0 times
...
Ronny
4 months ago
User 1: I think it's 0x2142 too. That's the magic number for password recovery.
upvoted 0 times
...
...

Save Cancel
az-700  pass4success  az-104  200-301  200-201  cissp  350-401  350-201  350-501  350-601  350-801  350-901  az-720  az-305  pl-300  

Warning: Cannot modify header information - headers already sent by (output started at /pass.php:70) in /pass.php on line 77