Chapter 2 Flashcards

0
Q

Router:

A

Forwards data packets to and from the Internet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
1
Q

Home routers are actually 4 devices in one. What are they?

A
  1. Router
  2. Switch
  3. Wireless access point
  4. Firewall appliance
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Switch:

A

Connects end devices using network cables.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Wireless access point:

A

consists of a radio transmitter capable of connecting end devices wirelessly.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Firewall appliance:

A

Secures outgoing traffic and derricks incoming traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

CISCO operating system.

A

CISCO internetwork Operating System (IOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Operating System breakdown.

A
  1. Shell
  2. Kernel
  3. Hardware
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Shell:

A

The user interface that allows users to request specific tasks from the computer. Through CLI or GUI interfaces.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Kernel:

A

Communicates between the hardware/software of a computer and manages how hardware resources are used to meet the requirements of software.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Hardware:

A

Physical part of a computer, including underlying electronics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

IOS is stored in:

A

Flash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is Flash?

A
  • Non-volatile storage. (Not list when power goes out)
  • can be changed or overwritten as needed.
  • can be used to store multiple versions of IOS.
  • IOS copied from flash to volatile RAM
  • quantity of flash and RAM memory determines IOS that can be used.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Functions performed by CISCO routers/switches.

A
  • provides network security
  • IP addressing of virtual and physical interfaces.
  • enabling interface specific configurations to optimize connectivity of the respective media.
  • routing
  • Enabling QoS technologies.
  • supporting network management technologies.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Most common methods to access the Command Line Interface (CLI).

A
  • Console
  • Telnet or SSH
  • AUX port
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Console Port Access method. Everything about it.

A
  • Device is accessible even if no networking services have been configured (out-of-band).
  • can also be used when the networking services have failed and remote access of the device is not possible.
  • requires a special console cable linked to a device running terminal emulation software.
  • should be configured with passwords to prevent unauthorized access.
  • device should be located in secure room.
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Telnet access method.

A

Method for remotely accessing the CLI over a network.

Require active networking services and one active interface that is configured.

16
Q

Secure Shell (SSH) access method.

A
  • Remote login, similar to telnet, but utilizes more security measures.
  • stronger password authentication
  • uses encryption when transporting data.
17
Q

Aux port access method.,

A
  • out of band connection.
  • provides modem access via a telephone line.
  • can be used like a console port, with a direct connection to a device running emulation software.
18
Q

Examples of Terminal Emulation Programs.

A
  • PuTTY
  • Tera Term
  • SecureCRT
  • HyperTerminal
  • OS X Terminal
19
Q

CISCO IOS Modes of Operation, in order.

A
  1. User EXEC
  2. Privileged EXEC
  3. Global Configuration
  4. Specialize modes.
20
Q

User EXEC mode abilities.

A

Basic monitoring commands. Aka “View-only” mode.

21
Q

Privileged EXEC mode abilities:

A

By default allows monitoring commands as well as execution configuration and management commands.

22
Q

Forms of help IOS provides.

A
  • context sensitive help(?)
  • command syntax check
  • hot keys and shortcuts.
23
Q

Host names of devices must meet these requirements: (pretty simple don’t overthink)

A

Start with a letter

No spaces

End with letter or digit

Use only letters, digits, and dashes

Less than 64 characters

24
Q

Enable password:,

A

Limits access to privileged exec mode.

25
Q

Enable secret:

A

Limits access to the privileged exec mode using encryption.

26
Q

Console password:

A

Limited device access using the console connection.

27
Q

VTY password:

A

Limited device access over Telnet.

28
Q

Purpose of MOTD banners:

A
  • important for legal process if someone breaks into device

- most always used to explain that the system is authorized-use only.

29
Q

Running Config vs. Startup Config

A
  • The running Config file reflects the current configuration applied to a IOS device.
  • Modifying a running Config, affects the operation of a device immediately.
  • Running Config stored in RAM
  • startup Config file reflects the Config that will be used by device upon reboot
  • the start configuration file is stored in NVRAM.
30
Q

IP Address stuff:

A
  • four decimal numbers between 0 and 225
  • accompanied by a subnet mask
  • can be assigned to both physical ports and virtual interfaces
31
Q

Ping loop back address:

A

127.7.0.0.1