Basic Switch and End Device Config. Flashcards

1
Q

All end devices and network devices require an ________ _________.

A

operating system (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is a kernel?

A

The portion of the OS that interacts directly with computer hardware is known as the kernel. It communicates between the hardware and software of a computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the shell?

A

The portion of the OS that interfaces with applications and the user is known as the shell. It allows users to request specific tasks from the computer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The user can interact with the shell using a ___________ ___________ or a ___________ ____ _________ .

A

command-line interface (CLI), graphical user interface (GUI)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is hardware?

A

The physical part of a computer including underlying electronics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

When using a CLI, the user interacts directly with the system in a ________ __________ by entering commands on the keyboard at a _________ ________.

A

text-based environment, command prompt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a GUI?

A
  • A GUI allows the user to interact with the system using an environment of graphical icons, menus, and windows.
    -It’s more user-friendly and requires less knowledge of the underlying command structure that controls the system.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Compared to a GUI, a CLI is ___ ________ _________ and _____ _____ compared to a GUI.

A

less resource intensive, very stable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a Cisco Internetwork Operating System (IOS)?

A

-The family of network operating systems used on many Cisco devices is called the Cisco Internetwork Operating System (IOS).
-Cisco IOS is used on many Cisco routers and switches regardless of the type or size of the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are some examples of Cisco OS’s?

A

-IOS XE
-IOS XR
-NX-OS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is firmware?

A

The operating system on home routers is usually called firmware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Network operating systems are similar to a PC operating system. Through a GUI, a PC operating system enables a user to do the following:

A

-Use a mouse to make selections and run programs
-Enter text and text-based commands
-View output on a monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A CLI-based network operating system (e.g., the Cisco IOS on a switch or router) enables a network technician to do the following:

A

-Use a keyboard to run CLI-based network programs
-Use a keyboard to enter text and text-based commands
-View output on a monitor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a switch?

A

-A switch will forward traffic by default and does not need to be explicitly configured to operate.
-For example, two configured hosts connected to the same new switch would be able to communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What are three methods a switch could be configured and secured?

A

-Console
-Secure Shell (SSH)
-Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the method of securing a switch through a console?

A

-Is a physical management port that provides out-of-band access to a Cisco device.
-When using a console port the device is accessible even if no networking services are configured.
-A computer running terminal software and a special console cable to connect to the device are required for a console connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is out-of-band access when referring to securing a switch through a console?

A

Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the method of securing a switch through Secure Shell (SSH)?

A

-SSH is in-band and a recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.
-SSH connections require active networking services on the device, including an active interface configured with an address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are terminal emulation programs?

A

-There are several terminal emulation programs used to connect to a networking device either by a serial connection over a console port or by an SSH/Telnet connection.
-These programs allow you to enhance your productivity.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are some examples of terminal emulation programs?

A

-PuTTY
-Tera Term
-SecureCRT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

As a security feature, the Cisco IOS software separates management access into the following two command modes:

A

-User EXEC Mode
-Privileged EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the User EXEC Mode?

A

-This mode has limited capabilities but is useful for basic operations.
-Allows only a limited number of basic monitoring commands but does not allow the execution of any commands that change the configuration of the device.
-In the CLI prompt it ends with the > symbol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is privileged EXEC Mode?

A

-To execute configuration commands, a network administrator must access privileged EXEC mode.
-Higher configuration modes, like global configuration mode, can only be reached from privileged EXEC mode.
-The privileged EXEC mode can be identified by the prompt ending with the # symbol.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is global config mode?

A

-To configure the device, the user must enter global configuration mode.
-CLI configuration changes are made that affect the operation of the device as a whole.
-It is identified by a prompt that ends with (config)# after the device name.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Global configuration mode is accessed before other _______ _______ _______. From the global config mode, the user can enter different ___________ ________.

A

specific configuration modes, subconfiguration modes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What are two common subconfiguration modes?

A

-Line configuration mode
-Interface configuration mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What is line configuration mode?

A

Used to configure console, SSH, Telnet, or AUX access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What is interface configuration mode?

A

Used to configure a switch port or router network interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

To move from user EXEC mode to privileged EXEC mode, use the ______ command.

A

enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

To return to the privileged EXEC mode, enter the _____ global config mode command.

A

exit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

To move in and out of global configuration mode, use the _________ ________ privileged EXEC mode command.

A

configure terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

To enter line subconfiguration mode, you use the _____ command followed by the ___________ ____ _____ and ________ you wish to access. Use the ____ command to exit a subconfiguration mode and return to global configuration mode.

A

line, management line type, number, exit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

To move from any subconfiguration mode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the ______ command.

A

exit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

To move from any subconfiguration mode to the privileged EXEC mode, enter the _____ command or enter the key combination ______.

A

end, Ctrl+Z

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is a keyword?

A

This is a specific parameter defined in the operating system. ex. Switch>show ip protocols

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is an argument?

A

This is not predefined; it is a value or variable defined by the user. Switch>ping 192.168.10.5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is a command syntax check?

A

-To determine the keywords and arguments required for a command, refer to the command syntax.
-The syntax provides the pattern, or format, that must be used when entering a command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The IOS has two forms of help available:

A

-Context-sensitive help
-Command syntax check

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

To access context-sensitive help, simply enter a ___________, at the CLI.

A

question mark (?)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is command syntax check?

A

-Verifies that a valid command was entered by the user.
- If the interpreter understands the command, the requested action is executed, and the CLI returns to the appropriate prompt.
- If the interpreter cannot understand the command, it will provide feedback describing what is wrong with the command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The IOS CLI provides ____ _____and that ______ makes configuring, monitoring, and troubleshooting easier.

A

hot keys, shortcuts

42
Q

True or false: Commands and keywords can be shortened to the minimum number of characters that identify a unique selection.

A

For example, the configure command can be shortened to conf because configure is the only command that begins with conf.

43
Q

What is a hostname?

A

-If all switches in a network were left with their default names, it would be difficult to identify a specific device.
-The hostname provides confirmation that you are connected to the correct device.

44
Q

Here are some important naming guidelines for hosts:

A

-Start with a letter
-Contain no spaces
-End with a letter or digit
-Use only letters, digits, and dashes
-Be less than 64 characters in length

45
Q

How do you change a device hostname?

A

-From the privileged EXEC mode, access the global configuration mode by entering the configure terminal command.
-From global configuration mode, enter the command hostname followed by the name of the switch and press Enter.

46
Q

What is the biggest security concern of organizations?

A

-The use of weak or easily guessed passwords continues to be the biggest security concern of organizations.
-Network devices, including home wireless routers, should always have passwords configured to limit administrative access.

47
Q

Cisco IOS can be configured to use __________ ______ _______ to allow different access privileges to a network device.

A

hierarchical mode passwords

48
Q

All networking devices should limit administrative access by securing _______ ____, _____ ______, and ______ ______ access with passwords.

A

privileged EXEC, user EXEC, remote Telnet

49
Q

When choosing passwords, use strong passwords that are not easily guessed. There are some key points to consider when choosing passwords:

A
  • More than eight characters in length.
    -Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences.
    -Avoid using the same password for all devices.
    -Do not use common words because they are easily guessed.
50
Q

To secure user EXEC mode access, enter line console configuration mode using the ___ ______ __ global configuration command.

A

line console 0

51
Q

What does the 0 represent in line console 0?

A

The zero is used to represent the first (and in most cases the only) console interface.

52
Q

After entering line console 0, what is the next step to securing the user EXEC mode password?

A

-Specify the user EXEC mode password using the password (password) command.
-Enable user EXEC access using the login command.

53
Q

To have administrator access to all IOS commands including configuring a device, you must gain ________ _____ _____ access. It is the most important access method because it provides complete access to the device.

A

Privileged EXEC mode

54
Q

How do you set a password for the privileged EXEC mode?

A

-Enter the configure terminal command in privileged EXEC mode.
-Use the enable secret (password) global config command.

55
Q

What are the Cisco Virtual Terminal (VTY) lines?

A

-Virtual terminal (VTY) lines enable remote access using Telnet or SSH to the device.
-Many Cisco switches support up to 16 VTY lines that are numbered 0 to 15.

56
Q

How do you set a password for the VTY lines?

A

To secure VTY lines, enter line VTY mode using the line vty 0 15 global config command.
-Specify the VTY password using the password (password) command.
-Enable VTY access using the login command.

57
Q

To encrypt all plaintext passwords, use the ______ _________ global config command.

A

service password-encryption

58
Q

What does the command service password-encryption do?

A

-The command applies weak encryption to all unencrypted passwords.
-This encryption applies only to passwords in the configuration file, not to passwords as they are sent over the network.
- Keeps unauthorized individuals from viewing passwords in the configuration file.

59
Q

Use the _____ _________ command to verify that passwords are now encrypted.

A

show running-config

60
Q

What do banner messages do?

A

-Banners can be an important part of the legal process in the event that someone is prosecuted for breaking into a device.
-Some legal systems do not allow prosecution, or even the monitoring of users, unless a notification is visible.

61
Q

How do you create a manner message?

A

-To create a banner message of the day on a network device, use the banner motd # the message of the day # global config command.

62
Q

What is the # in a banner message?

A

-The “#” in the command syntax is called the delimiting character. It is entered before and after the message.
-The delimiting character can be any character as long as it does not occur in the message.

63
Q

There are two system files that store the device configuration:

A

-Startup-config
-Running-config

64
Q

What is the startup-config system file?

A

-This is the saved configuration file that is stored in NVRAM.
-It contains all the commands that will be used by the device upon startup or reboot.
-Flash does not lose its contents when the device is powered off.

65
Q

What is the running-config system file?

A

-This is stored in Random Access Memory (RAM).
-RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
-Modifying a running configuration affects the operation of a Cisco device immediately.

66
Q

The _____ __________ privileged EXEC mode command is used to view the running config.

A

show running-config

67
Q

To view the startup configuration file, use the _____ ________ privileged EXEC command.

A

show startup-config

68
Q

True or false: if power to the device is lost, or if the device is restarted, all configuration changes will be lost unless they have been saved.

A

True

69
Q

To save changes made to the running configuration to the startup configuration file, use the ____ _________ ______ privileged EXEC mode command.

A

copy running-config startup-config (copy run start)

70
Q

If changes made to the running config do not have the desired effect and the ____________ has not yet been saved, you can restore the device to its previous configuration.

A

running-config

71
Q

Remove the changed commands individually, or reload the device using the _______ privileged EXEC mode command to restore the startup-config.

A

reload

72
Q

What is the downside to running the reload command?

A

The downside to using the reload command to remove an unsaved running-config is the brief amount of time the device will be offline, causing network downtime.

73
Q

Alternatively, if undesired changes were saved to the _______ ______ , it may be necessary to clear all the configurations. This requires erasing the startup config and restarting the device. The startup config is removed by using the _______ _________ privileged EXEC mode command.

A

startup config, erase startup-config

74
Q

What does it mean to capture a configuration to a text file?

A

-Configuration files can also be saved and archived to a text document.
-This ensures that a working copy of the configuration file is available for editing or reuse later.

75
Q

What is the purpose of an IP address?

A

-The use of IP addresses is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet.
-Each end device on a network must be configured with an IP address.

76
Q

What is the structure of an IPv4 address called?

A

-The structure of an IPv4 address is called dotted decimal notation.
-It’s represented by four decimal numbers between 0 and 255.
-IPv4 addresses are assigned to individual devices connected to a network.

77
Q

____ is the most recent version of IP and is replacing the more common IPv4.

A

IPv6

78
Q

What is an IPv4 subnet mask?

A

-It’s a 32-bit value that differentiates the network portion of the address from the host portion.
-With the IPv4 address, the subnet mask determines to which subnet the device is a member.

79
Q

What is a default gateway address?

A

The default gateway address is the IP address of the router that the host will use to access remote networks, including the internet.

80
Q

IPv6 addresses are _______ in length and written as a string of ___________ ______. Every ____ ____ is represented by a single hexadecimal digit; for a total of ___ hexadecimal values.

A

128 bits, hexadecimal values, four bits, 32

81
Q

Groups of four hexadecimal digits are separated by a ______. IPv6 addresses are not _________ and can be written in either lowercase or uppercase.

A

colon (:), case-sensitive

82
Q

What are four types of network media used for network communications?

A

-Twisted-pair copper cables
-Fiber-optic cables
-Coaxial cables
-Wireless

83
Q

Different types of network media have different features and benefits. Not all network media have the same characteristics. Not all media are appropriate for the same purpose. These are some of the differences between various types of media:

A

-Distance the media can carry a signal.
-Environment in which the media is to be installed.
-Amount of data and the speed
-Cost of the media and installation

84
Q

Not only does each link on the internet require a specific network media type, but each link also requires a _________ _________ ________.

A

particular network technology

85
Q
A
86
Q

_______ is the most common local-area network (LAN) technology used today.

A

Ethernet

87
Q

Ethernet ports are found on end-user devices, switch devices, and other networking devices that can…

A

physically connect to the network using a cable.

88
Q

Cisco IOS Layer 2 switches have ______ ______ for devices to connect. These ports do not support ______ __ IP addresses. Therefore, switches have one or more ______ _______ ______.

A

physical ports, Layer 3, switch virtual interfaces (SVIs).

89
Q

What is the purpose of switch virtual interfaces (SVIs)?

A

These are virtual interfaces because there is no physical hardware on the device associated with it.

90
Q

What do SVIs allow you to do?

A

-Lets you remotely manage a switch over a network using IPv4 and IPv6. -Each switch comes with one SVI default configuration “out-of-the-box.”

91
Q

The default SVI is interface ______.

A

VLAN1

92
Q

True or False: A Layer 2 switch does not need an IP address. The IP address assigned to the SVI is used to remotely access the switch. An IP address is not necessary for the switch to perform its operations.

A

True

93
Q

IPv4 address information can be entered into end devices manually, or automatically using ________ ____ _______ _______.

A

Dynamic Host Configuration Protocol (DHCP)

94
Q

What is the purpose of DHCP?

A

-End devices default to using DHCP for automatic IPv4 address configuration.
-Manual configuration increases misconfiguration by duplicating another device’s IPv4 address.

95
Q

To access the switch remotely, an __ ______ and a _______ ______ must be configured on the ____.

A

IP address, subnet mask, SVI

96
Q

To configure an SVI on a switch, use the ________ ____ __ global configuration command. Vlan 1 is not an actual physical interface but a _______ one.

A

interface vlan 1, virtual

97
Q

What is the second step to configuring an IP address on Vlan 1?

A
  • Next, assign an IPv4 address using the ip address (ip-address) subnet-mask interface configuration command.
    -Finally, enable the virtual interface using the no shutdown interface configuration command.
98
Q

How do you configure a default gateway on Vlan 1?

A

This can be done using the ip default-gateway (ip-address) global configuration command.

99
Q

In the same way that you use commands and utilities like ________ to verify the network configuration of a PC host, you also use commands to verify the interfaces and address settings of ________ _____ like switches and routers.

A

ipconfig, intermediary devices

100
Q

The ____ __ ______ ____ command is useful for verifying the condition of the switch interfaces.

A

show ip interface brief

101
Q

The ____ command can be used to test connectivity to another device on the network or a website on the internet.

A

ping

102
Q
A