Chapter 2 - Basic End Device/Switch Configuration Flashcards

1
Q

What Methods are There for Accessing the Command Line Interface (CLI)?

A
  • Secure Shell (SSH): a secure, remote in-band management to a virtual interface (uses encryption)
  • Telnet: an insecure equivalent, can be used for initial device setup (uses plaintext)
  • Console: a physical management port providing out-of-band access via a computer terminal emulation program
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Configuration Modes are There?

A
  • User EXEC: automatically in this mode
  • Privileged EXEC: accessed by entering ‘enable’
  • Global Config: accessed by entering ‘config t’
  • Specific Config: could be for an interface so ‘interface [port/ip address]’
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What are the IOS Hotkeys?

A
  • Tab: completes command
  • Ctrl-R: re-displays a line
  • Ctrl-Z: exits config mode, back to prov. EXEC mode
  • Down/Up: scroll through former commands
  • Ctrl-Shift-6: interrupt an IOS process
  • Ctrl-C: aborts current command and exits config mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

How is Access Limited on a Device?

A
  1. Enable Password: limits access to the privileged EXEC mode
  2. Enable Secret: encrypted and limits access to the privileged EXEC mode
  3. Console Password: limits device access using the console connection
  4. VTY Password: limits device remote access using Telnet/SSH
How well did you know this?
1
Not at all
2
3
4
5
Perfectly