Cisco 1,2, 3,4 Flashcards
All end devices and network devices require an
Operating Systems (OS)
The user can interact with the shell using a
command-line interface (CLI) or a graphical user interface (GUI).
The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces
Shell
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements
Kernel
The physical part of a computer including underlying electronics
Hardware
such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows.
GUI
A switch will forward traffic by default and does not need to be explicitly configured to operate.
Access Methods
This is a physical management port that provides out-of-band access to a Cisco device. Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only
Console
an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.
Secure Shell (SSH)
is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network.
Telnet
you can use to connect to a networking device either by a serial connection over a console port, or by an SSH/Telnet connection
Terminal Emulation Programs
This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device.
User EXEC Mode
To execute configuration commands, a network administrator must access
Privileged EXEC Mode
Mode allows access to only a limited number of basic monitoring commands.
It is often referred to as “view-only” mode.
User EXEC Mode
Mode allows access to all commands and features.
The user can use any monitoring commands and execute configuration and management commands.
Privileged EXEC Mode
Used to configure console, SSH, Telnet, or AUX access.
Line Configuration Mode
Used to configure a switch port or router network interface.
Interface Configuration Mode
To move in and out of global configuration mode, use the
Configure Terminal
As shown in the figure, the portion of the OS that interacts directly with computer hardware is known as the kernel. The portion that interfaces with applications and the user is known as the shell.
T
When using a CLI, the user interacts directly with the system in a text-based environment by entering commands on the keyboard at a command prompt,
T
A GUI such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows.
T
GUIs may not always be able to provide all the features available with the CLI. GUIs can also fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a CLI. The CLI is less resource intensive and very stable when compared to a GUI.
T
When you are learning how to modify device configurations, you might want to start in a safe, non-production environment before trying it on real equipment.
T
Which IOS mode allows access to all commands and features?
Privileged EXEC mode
Which IOS mode are you in if the Switch(config)# prompt is displayed?
Global Configuration Mode
Which IOS mode are you in if the Switch> prompt is displayed?
User EXEC Mode
Which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in? (Choose two.)
CTRL Z
END
This is a specific parameter defined in the operating system (in the figure, ip protocols).
Keyword
This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5).
Argument
text indicates commands and keywords that you enter literally as shown.
Boldface
text indicates arguments for which you supply values
Italics
indicate an optional element (keyword or argument)
Square Brackets`
indicate a required element (keyword or argument).
Braces
indicate a required choice within an optional element. Spaces are used to clearly delineate parts of the command.
Braces and vertical lines within square brackets
The command is ping and the user-defined argument is the ip-address of the destination device. For example, ping 10.10.10.5.
ping ip-address
The command is traceroute and the user-defined argument is the ip-address of the destination device. For example, traceroute 192.168.254.254.
Traceroute ip-address
When a command output produces more text than can be displayed in a terminal window, the IOS will display a “–More–” prompt.
T
The use of weak or easily guessed passwords continues to be the biggest security concern of organizations. Network devices, including home wireless routers, should always have passwords configured to limit administrative access.
T
All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and remote Telnet access with passwords. In addition, all passwords should be encrypted and legal notifications provided.
T
What is the command to assign the name “Sw-Floor-2” to a switch?
hostname SW-floor 2
How is the privileged EXEC mode access secured on a switch?
enable secret class
Which command enables password authentication for user EXEC mode access on a switch?
login
Which command encrypts all plaintext passwords access on a switch?
service password encryption
Which is the command to configure a banner to be displayed when connecting to a switch?
banner motd $ Keep out $
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.
startup-config
This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
running-config
The downside to using the reload command to remove an unsaved running config is the brief amount of time the device will be offline, causing network downtime.
T
What is the structure of an IPv4 address called?
dotted- decimal format
How is an IPv4 address represented?
four decimal number between 0 and 255 separated by period.
What type of interface has no physical port associated with it?
Switch Virtual Interface SVI
(DHCP).
Dynamic Host Configuration Protocol
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified
Which two statements are true regarding the user EXEC mode?
The device prompt for this mode ends with >
Only some aspects of the router configuration can be viewed
Which type of access is secured on a Cisco router or switch with the enable secret command?
privileged EXEC
What is the default SVI on a Cisco switch?
VLAN1
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines?
Should begin with letter
no spaces
no more than 64 characters
What is the function of the shell in an OS?
Interfaces between the users and kernel
A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display
User EXEC Model
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
Nothing must be done
Which memory location on a Cisco router or switch will lose all content when the device is restarted?
RAM
Why would a technician enter the command copy startup-config running-config?
To copy an existing configuration into RAM
Which functionality is provided by DHCP?
Automatic assignment of an IP address to each host
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
Displaying a list of available commands within the current mode
determining which keyword, option, or argument is available for the entered command
Which memory location on a Cisco router or switch stores the startup configuration file?
NVRAM
To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?
10.1.0.0
Whether connecting to a local printer in the home or a website in another country, before any network communications can occur, a___ ____ to a local network must be established
physical connection
NIC
Network Interface Cards
Not all physical connections are equal, in terms of the performance level, when connecting to a network.
T
The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
T
The destination node physical layer retrieves these individual signals from the media, restores them to their bit representations, and passes the bits up to the data link layer as a complete frame.
T
he physical layer is only concerned with wired network connections.
T
When a frame is encoded by the physical layer, all bits are sent over the media at the same time.
F
The physical layer of the receiving device passes bits up to which higher level layer?
Data Link
The physical layer of the receiving device passes bits up to which higher level layer?
Frame
The protocols and operations of the upper OSI layers are performed using software designed by software engineers and computer scientists.
T
The physical layer consists of electronic circuitry, media, and connectors developed by engineers.
T
it is appropriate that the standards governing this hardware are defined by the relevant electrical and communications engineering organizations.
T
ISO
International Organization for Standardization
TIA/EIA
Telecommunications Industry Association/Electronic Industries Association
ITU
International Telecommunication Union
ANSI
American National Standards Institute
IEEE
Institute of Electrical and Electronics Engineers
FCC
National telecommunications regulatory authorities including the Federal Communication Commission in the USA
(ETSI)
the European Telecommunications Standards Institute
The physical layer standards address three functional areas:
Physical Components
Encoding
Signaling
are the electronic hardware devices, media, and other connectors that transmit the signals that represent the bits.
Physical Components
is a method of converting a stream of data bits into a predefined “code”
Encoding or Line Encoding
The physical layer must generate the electrical, optical, or wireless signals that represent the “1” and “0” on the media.
Signaling
Different physical media support the transfer of bits at different rates. Data transfer is usually discussed in terms of
Bandwidth
Bandwidth is typically measured in
Kilobits per second (kbps), Megabit per second (Mbps) or gigabits per second (Gbps)
Terms used to measure the quality of bandwidth include:
Latency
Throughput
Goodput
refers to the amount of time, including delays, for data to travel from one given point to another.
Latency
is the measure of the transfer of bits across the media over a given period of time.
Throughput
There is a third measurement to assess the transfer of usable data; it is known as
Goodput
Which media uses patterns of microwaves to represent bits?
Wireless
Which media uses patterns of light to represent bits?
Fiber-optic
Which media uses electrical pulses to represent bits?
copper
Which of these is the name for the capacity of a medium to carry data?
bandwidth
Which of these is a measure of the transfer of bits across the media?
throughput
can distort and corrupt the data signals being carried by copper media. Potential sources of EMI and RFI include radio waves and electromagnetic devices, such as fluorescent lights or electric motors.
Electromagnetic interference (EMI) or radio frequency interference (RFI)
Is a disturbance caused by the electric or magnetic fields of a signal on one wire to the signal in an adjacent wire.
Crosstalk
cabling is the most common networking media.
Unshielded Twisted Pair (UTP Cable)
provides better noise protection than UTP cabling
Shielded Twisting Pairing (STP Cable)
gets its name from the fact that there are two conductors that share the same axis.
Coaxial Cable
A copper conductor is used to transmit the electronic signals.
T
A layer of flexible plastic insulation surrounds a copper conductor.
T
The insulating material is surrounded in a woven copper braid, or metallic foil, that acts as the second wire in the circuit and as a shield for the inner conductor. This second layer, or shield, also reduces the amount of outside electromagnetic interference.
T
The entire cable is covered with a cable jacket to prevent minor physical damage.
T
Coaxial cables attach antennas to wireless devices. The coaxial cable carries radio frequency (RF) energy between the antennas and the radio equipment.
Wireless Installations
Cable service providers provide internet connectivity to their customers by replacing portions of the coaxial cable and supporting amplification elements with fiber-optic cable. However, the wiring inside the customer’s premises is still coax cable.
Cable Internet Installations
Which of the following attaches antennas to wireless devices? It can also be bundled with fiber-optic cabling for two-way data transmission.
Coaxial Cable
Which of the following counters EMI and RFI by using shielding techniques and special connectors?
STP
Which of the following is the most common network media?
UTP
Which of the following terminates with BNC, N type and F type connectors?
Coaxial
When used as a networking medium, UTP cabling consists of four pairs of color-coded copper wires that have been twisted together and then encased in a flexible plastic sheath. Its small size can be advantageous during installation.
T
UTP cable does not use shielding to counter the effects of EMI and RFI. Instead, cable designers have discovered other ways that they can limit the negative effect of crosstalk:
T
Designers now pair wires in a circuit. When two wires in an electrical circuit are placed close together, their magnetic fields are the exact opposite of each other. Therefore, the two magnetic fields cancel each other and also cancel out any outside EMI and RFI signals.
Cancellation
To further enhance the cancellation effect of paired circuit wires, designers vary the number of twists of each wire pair in a cable. UTP cable must follow precise specifications governing how many twists or braids are permitted per meter (3.28 feet) of cable. Notice in the figure that the orange/orange white pair is twisted less than the blue/blue white pair. Each colored pair is twisted a different number of times.
Varying the number of twists per wire pair
UTP cable relies solely on the cancellation effect produced by the twisted wire pairs to limit signal degradation and effectively provide self-shielding for wire pairs within the network media.
T
The most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router.
Ethernet Straight-through
A cable used to interconnect similar devices. For example, to connect a switch to a switch, a host to a host, or a router to a router.
Ethernet Crossover
Using a crossover or straight-through cable incorrectly between devices may not damage the devices, but connectivity and communication between the devices will not take place.
T
Optical fiber cable transmits data over longer distances and at higher bandwidths than any other networking media.
T
Optical fiber is a flexible, but extremely thin, transparent strand of very pure glass, not much bigger than a human hair
T
(SMF)
Single Mode Fiber
MMF
Multimode fiber
Used for backbone cabling applications and interconnecting infrastructure devices
Enterprise Networks