Chapter Two Flashcards
(34 cards)
Kernel
the portion of the operating system that interacts directly with computer hardware
Shell
the portion of the operating system that interfaces with applications and the user
Command-Line Interface (CLI)
a user interface to a computer operating system or application that depends on textual commands being entered by the user
Graphical User Interface (GUI)
a user-friendly interface that uses graphical images and widgets, along with text, to indicate the information and actions available to a user when interacting with a computer
Telnet
a non-secure network service that supports CLI access to a remote host. It also ca be used to verify the application later software between sources and destination stations
Firmware
permanent software programmed into ROM memory
Cisco Internetwork Operating System (IOS)
generic term for the collection of network operating systems used by Cisco networking devices
Console
term used to describe data transfer that requires the establishment of a virtual circuit
Secure Shell (SSH)
a protocol that provides a secure remote connection to a host through a TCP application
User EXEC Mode
the limited CLI mode where the commands available to the user area a subset of those available a the privileged level. In general, use the user EXEC commands to temporarily change terminal settings, perform basic tests, and list system information
Privileged EXEC Mode
an IOS administrative level mode that supports access to configuration
Global Configuration Mode
a mode used to configure global parameters to enter other configuration submodes, such as interface, router, and line configuration submodes
Ping
a troubleshooting tool used to verify network connectivity by sending a packet to a specific IP address and waiting for the reply
Traceroute
a command on many computer operating systems that discovers the IP addresses and possible hostnames of the routers used by the network when sending a packet from on computer to another
Switch Virtual Interface (SVI)
a virtual interface for which there is no associated physical hardware on the device. An SVI is created in software. The virtual interfaces are used as a means to remotely manage a switch over a network. They are also used for routing between VLANs
Dynamic Host Configuration Protocol (DHCP)
a protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request and assign an IP address, a default gateway, and a DNS server address to a network host
Random-Access Memory (RAM)
also known as read/write memory, memory that can have new data written to it and that can have stored data read from it. RAM is the main working area, or temporary storage, used by a CPU for most processing and operations. A drawback of RAM is that it requires electrical power to maintain data storage. If the computer is turned off or loses power, all data stored in RAM is lost unless the data was previously saved to disk. Memory boards with RAM chips plug into the mother bound
IPv4 Address
a 32-bit number, written in dotted decimal notation, used by the IPv4 protocol to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing. As a source address, it enables a computer to receive a packet and to know to which IP address a response should be sent
Virtual Terminal (vty)
a text-based logical interface on an IOS device. It is accessed using Telnet or SSH to perform administrative tasks. A vty line is also called a virtual type terminal
Nonvolatile Random-Access Memory
memory whose contents are not erased when the computer is powered off
Domain Name System (DNS
an internet-wide system by which a hierarchical set of DNS servers collectively hold all the name-to-IP address mapping and DNS servers refer users to the correct DNS server to successfully resolve a DNS name
Which statement is true about the running configuration file in a Cisco IOS device?
a. it affects the operation of the device immediately when modified
b. it is stored in NVRAM
c. it should be deleted using the erace running-config command
d. it is automatically saved when the router reboots
A. the running configuration file reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately
Which two statements are true regarding user EXEC mode? (choose two)
a. all router commands are available
b. global configuration mode can be accessed by entering the enable command
c. the device prompts for this mode ends with the > symobol
d. interfaces and routing protocols can be configured
e. only some aspects of the router configuration can be viewed
C and E. User EXEC mode has limited capabilities, but it is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device. User EXEC mode is identified by the CLI prompt that ends with the > symbol.
Which type of access if secured on a Cisco router or switch with the enable secret command?
a. virtual terminal
b. priviledged EXEC
c. AUX port
d. console line
B. Higher configuration modes such as global configuration mode, can be reached from priviliedged EXEC mode. When this mode is configured, the enable secret password is required to enter priviledged EXEC mode.