Configuring a Network Operating System Chap 2 Flashcards

1
Q

What is the portion of the OS code that interacts directly with the computer hardware?

A

kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The user interface that allows users to request specific tasks from the computer either through the cli or gui interfaces

A

shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the physical part of a computer including underlying electronics?

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the semi-permanent memory where the IOS file is stored?

A

flash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where is the IOS copied to when the device is powered on?

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 ways to access the CLI environment?

A

console, telnet or ssh, aux port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which port provides out-of-band and is preferred because it provides troubleshooting (startup, debugging, and error messages)?

A

Console port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Method for remotely establishing a CLI session of a device, through a virtual interface, over a network.

A

telnet or ssh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provides remote login with stronger password authentication and uses encryption when transporting session data.

A

secure shell or ssh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An older way, also out-of-band, to establish a CLI session remotely is via a telephone dialup connection using a modem connected to the:

A

auxiliary port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are in the equipment room with a new switch that needs to be configured. Which access method would you use?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The device you are configuring cannot be accessed by cable, because you are not in the building. You use a telephone to dial into it. Which access method would you use?

A

Aux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your manager gives you a special cable and tells you to use it to configure the switch. Which access method would you use?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You access the IOS by using another intermediary device over a network connection. Which access method would you use?

A

Telnet/SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are on vacation and need to check on one of your routers. The only access you have is your hotel analog phone. Which access method would you use?

A

Aux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You do not need remote access services to the networking device to configure it because the device is physically accessible to you. Which access method would you use?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You call your manager to tell him you cannot access your router in another city over the Internet. He provides you with the information to access the switch through a telephone connection. Which access method would you use?

A

Aux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The password for a device was changed. No one knows what the new password is and you need to reset a new password. Which access method would you use?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You use a password-encrypted connection to remotely access a device over a network. Which access method would you use?

A

telnet/ssh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IOS mode that allows only a limited number of basic monitoring commands and is often referred to as view-only mode.

A

user exec mode

21
Q

IOS mode that allows all monitoring commands by default as well as execution of configuration and management commans.

A

privileged exec mode

22
Q

identified by the cli prompt that ends with > symbol

A

user exec mode

23
Q

mode can be identified by the prompt ending with the # symbol

A

privileged exec mode

24
Q

The primary configuration mode, configuration changes are made here that affect the operation of the device as a whole.

A

global configuration mode

25
Q

mode that can be identified with (config)#

A

global configuration mode

26
Q

mode that can be identified with (config-if)#

A

interface mode

27
Q

mode that can be identified with (config-line)#

A

line mode

28
Q

Allows the user to scroll forward through former commands

A

Down Arrow

29
Q

Allows the user to scroll backward through former commands

A

Up Arrow

30
Q

Completes the remainder of a partially typed command or keyword

A

tab

31
Q

Moves to the beginning of the line

A

ctrl-a

32
Q

Moves to the end of the line

A

Ctrl-E

33
Q

Redisplays a line

A

ctrl-r

34
Q

Exits the configuration mode and returns to user EXEC

A

ctrl-z

35
Q

Exits the configuration mode or aborts the current command

A

Ctrl-C

36
Q

Allows the user to interrupt an IOS process such as ping or traceroute

A

Ctrl-Shift-6

37
Q

Hostname guidelines for naming conventions are that names should:

A
Start with a letter
Contain no spaces
End with a letter or digit
Use only letters, digits, and dashes
Be less than 64 characters in length
38
Q

Limits access to the privileged EXEC mode

A

enable password

39
Q

Encrypted, limits access to the privileged EXEC mode

A

enable secret

40
Q

Limits device access using the console connection

A

console password

41
Q

Limits device access over Telnet

A

vty password

42
Q

the banner that will be displayed on all subsequent attempts to access the device until the banner is removed.

A

motd banner

43
Q

command that is the best way to return a the configuration back to the original configuration assuming that we have not overwritten the startup config with the changes

A

reload

44
Q

command to clear the startup config

A

erase startup-config

45
Q

command that needs to be used to delet the vlan data when returning a device to its default out of box configuration

A

delete vlan.dat

46
Q

command that lists the complete configuration currently active in RAM

A

show running-config

47
Q

command that lists the configuration currently in nvram

A

show startup-config

48
Q

command to copy the configuration in RAM into NVRAM

A

copy running-config startup-config

49
Q

what is the address that is defined by the TCP/IP protocol as a reserved address that routes packets back to the host.

A

loopback address 127.0.0.1