Chapter Two Flashcards

1
Q

Kernel

A

the portion of the operating system that interacts directly with computer hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Shell

A

the portion of the operating system that interfaces with applications and the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Command-Line Interface (CLI)

A

a user interface to a computer operating system or application that depends on textual commands being entered by the user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Graphical User Interface (GUI)

A

a user-friendly interface that uses graphical images and widgets, along with text, to indicate the information and actions available to a user when interacting with a computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Telnet

A

a non-secure network service that supports CLI access to a remote host. It also ca be used to verify the application later software between sources and destination stations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Firmware

A

permanent software programmed into ROM memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Cisco Internetwork Operating System (IOS)

A

generic term for the collection of network operating systems used by Cisco networking devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Console

A

term used to describe data transfer that requires the establishment of a virtual circuit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure Shell (SSH)

A

a protocol that provides a secure remote connection to a host through a TCP application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

User EXEC Mode

A

the limited CLI mode where the commands available to the user area a subset of those available a the privileged level. In general, use the user EXEC commands to temporarily change terminal settings, perform basic tests, and list system information

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Privileged EXEC Mode

A

an IOS administrative level mode that supports access to configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Global Configuration Mode

A

a mode used to configure global parameters to enter other configuration submodes, such as interface, router, and line configuration submodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Ping

A

a troubleshooting tool used to verify network connectivity by sending a packet to a specific IP address and waiting for the reply

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Traceroute

A

a command on many computer operating systems that discovers the IP addresses and possible hostnames of the routers used by the network when sending a packet from on computer to another

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Switch Virtual Interface (SVI)

A

a virtual interface for which there is no associated physical hardware on the device. An SVI is created in software. The virtual interfaces are used as a means to remotely manage a switch over a network. They are also used for routing between VLANs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Dynamic Host Configuration Protocol (DHCP)

A

a protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address, a default gateway, and a DNS server address to a network host

15
Q

Random-Access Memory (RAM)

A

also known as read/write memory, memory that can have new data written to it and that can have stored data read from it. RAM is the main working area, or temporary storage, used by a CPU for most processing and operations. A drawback of RAM is that it requires electrical power to maintain data storage. If the computer is turned off or loses power, all data stored in RAM is lost unless the data was previously saved to disk. Memory boards with RAM chips plug into the mother bound

15
Q

IPv4 Address

A

a 32-bit number, written in dotted decimal notation, used by the IPv4 protocol to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing. As a source address, it enables a computer to receive a packet and to know to which IP address a response should be sent

15
Q

Virtual Terminal (vty)

A

a text-based logical interface on an IOS device. It is accessed using Telnet or SSH to perform administrative tasks. A vty line is also called a virtual type terminal

16
Q

Nonvolatile Random-Access Memory

A

memory whose contents are not erased when the computer is powered off

17
Q

Domain Name System (DNS

A

an internet-wide system by which a hierarchical set of DNS servers collectively hold all the name-to-IP address mapping and DNS servers refer users to the correct DNS server to successfully resolve a DNS name

18
Q

Which statement is true about the running configuration file in a Cisco IOS device?
a. it affects the operation of the device immediately when modified
b. it is stored in NVRAM
c. it should be deleted using the erace running-config command
d. it is automatically saved when the router reboots

A

A. the running configuration file reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately

19
Q

Which two statements are true regarding user EXEC mode? (choose two)
a. all router commands are available
b. global configuration mode can be accessed by entering the enable command
c. the device prompts for this mode ends with the > symobol
d. interfaces and routing protocols can be configured
e. only some aspects of the router configuration can be viewed

A

C and E. User EXEC mode has limited capabilities, but it is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device. User EXEC mode is identified by the CLI prompt that ends with the > symbol.

20
Q

Which type of access if secured on a Cisco router or switch with the enable secret command?
a. virtual terminal
b. priviledged EXEC
c. AUX port
d. console line

A

B. Higher configuration modes such as global configuration mode, can be reached from priviliedged EXEC mode. When this mode is configured, the enable secret password is required to enter priviledged EXEC mode.

21
Q

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (choose three)
a. the hostname should be fewer than 64 characters in length
b. the hostname should be written in all lowercase letters
c. the hostname should contain no spaces
d. the hostname should end with a special character
e. the hostname should begin with a letter

A

A, C, and E. The guidelines for configuring a hostname are:
- start with a letter
- include no spaces
- end with a letter or digit
- use only letters, digits, and dashes
- be fewer than 64 characters in length

21
Q

What is the default SVI on a Cisco switch?
a. VLAN 1
b. VLAN 99
c. VLAN 100
d. VLAN 999

A

A. VLAN 1 is not a physical interface but a virtual one. VLAN 1 is the deafult VLAN on a Cisco switch

22
Q

What is the function of the shell in an OS?
a. it interacts with the device hardware
b. it interfaces between the users and the kernel
c. it provides dedicated firewall services
d. it provides intrusion protection services for the device

A

B. the portion of the OS that interacts directly with computer hardware is known as the kernel

23
Q

A switch with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no line console 0 password. When the router boots up, which mode will display?
a. global configuration mode
b. setup mode
c. priviledged EXEC mode
d. user EXEC mode

A

D. the switch will boot up in user EXEC mode. Without a console password previously set on the switch, the user will be in user EXEC mode.

24
Q

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
a. copy the running configuration to the startup configuration file
b. copy the information in the startup configuration file to the running configuration
c. reload the device and type yes when prompted to save the configuration
d. nothing must be done. changes to the configuration on an IOS device take eddect as soon as the command is typed correctly and the Enter key has been pressed

A

D. Most commands entered in IOS take effect immediately, including the configuration of an IP address on an interface

25
Q

Which memory location on a Cisco router or switch loses all content when the device is restarted?
a. ROM
b. flash
c. NVRAM
d. RAM

A

D. RAM is volatile memory and loses all information when the device is restarted

26
Q

Why would a techician enter the command copy startup-config running-config?
a. to remove all configurations from the switch
b. to save an active configuration to NVRAM
c. to copy an existing configuration into RAM
d. to make a changed configuration the new startup configuration

A

C. the command copy startup-config running-config copies the startup configuration file from NVRAM into the running configuration file in RAM

27
Q

Which functionality is provided by DHCP?
a. automatic assignment of an IP address to each host
b. remote switch management
c. translation of IP addresses to domain names
d. end-to-end connectivity test

A

A. a server using DHCP can be used to automatically assign IP address information to a host

28
Q

What two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI (choose two)
a. providing an error message when an incorrect command is submitted
b. displaying a list of all commands available in the current mode
c. allowing the user to complete the remainder of an abbreviated command with the TAB key
d. determining which option, keyowrd, or argument is available for the entered command
e. selecting the best command to accomplish a task

A

B and D. Context-sensitive help provides
- commands available in each command mode
- commands that start with specific characters or group of characters
- arguments and keywords that are available to particular commands

29
Q

Which memory location on a Cisco router stores the startup configuration files?
a. RAM
b. ROM
c. NVRAM
d. flash

A

C. the startup configuration file on a router is stored in NVRAM and retains information when power is lost