Configuring a Network Operating System Chap 2 Flashcards
What is the portion of the OS code that interacts directly with the computer hardware?
kernel
The user interface that allows users to request specific tasks from the computer either through the cli or gui interfaces
shell
What is the physical part of a computer including underlying electronics?
hardware
What is the semi-permanent memory where the IOS file is stored?
flash
Where is the IOS copied to when the device is powered on?
RAM
What are the 3 ways to access the CLI environment?
console, telnet or ssh, aux port
Which port provides out-of-band and is preferred because it provides troubleshooting (startup, debugging, and error messages)?
Console port
Method for remotely establishing a CLI session of a device, through a virtual interface, over a network.
telnet or ssh
Provides remote login with stronger password authentication and uses encryption when transporting session data.
secure shell or ssh
An older way, also out-of-band, to establish a CLI session remotely is via a telephone dialup connection using a modem connected to the:
auxiliary port
You are in the equipment room with a new switch that needs to be configured. Which access method would you use?
Console
The device you are configuring cannot be accessed by cable, because you are not in the building. You use a telephone to dial into it. Which access method would you use?
Aux
Your manager gives you a special cable and tells you to use it to configure the switch. Which access method would you use?
Console
You access the IOS by using another intermediary device over a network connection. Which access method would you use?
Telnet/SSH
You are on vacation and need to check on one of your routers. The only access you have is your hotel analog phone. Which access method would you use?
Aux
You do not need remote access services to the networking device to configure it because the device is physically accessible to you. Which access method would you use?
Console
You call your manager to tell him you cannot access your router in another city over the Internet. He provides you with the information to access the switch through a telephone connection. Which access method would you use?
Aux
The password for a device was changed. No one knows what the new password is and you need to reset a new password. Which access method would you use?
Console
You use a password-encrypted connection to remotely access a device over a network. Which access method would you use?
telnet/ssh
IOS mode that allows only a limited number of basic monitoring commands and is often referred to as view-only mode.
user exec mode
IOS mode that allows all monitoring commands by default as well as execution of configuration and management commans.
privileged exec mode
identified by the cli prompt that ends with > symbol
user exec mode
mode can be identified by the prompt ending with the # symbol
privileged exec mode
The primary configuration mode, configuration changes are made here that affect the operation of the device as a whole.
global configuration mode
mode that can be identified with (config)#
global configuration mode
mode that can be identified with (config-if)#
interface mode
mode that can be identified with (config-line)#
line mode
Allows the user to scroll forward through former commands
Down Arrow
Allows the user to scroll backward through former commands
Up Arrow
Completes the remainder of a partially typed command or keyword
tab
Moves to the beginning of the line
ctrl-a
Moves to the end of the line
Ctrl-E
Redisplays a line
ctrl-r
Exits the configuration mode and returns to user EXEC
ctrl-z
Exits the configuration mode or aborts the current command
Ctrl-C
Allows the user to interrupt an IOS process such as ping or traceroute
Ctrl-Shift-6
Hostname guidelines for naming conventions are that names should:
Start with a letter Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in length
Limits access to the privileged EXEC mode
enable password
Encrypted, limits access to the privileged EXEC mode
enable secret
Limits device access using the console connection
console password
Limits device access over Telnet
vty password
the banner that will be displayed on all subsequent attempts to access the device until the banner is removed.
motd banner
command that is the best way to return a the configuration back to the original configuration assuming that we have not overwritten the startup config with the changes
reload
command to clear the startup config
erase startup-config
command that needs to be used to delet the vlan data when returning a device to its default out of box configuration
delete vlan.dat
command that lists the complete configuration currently active in RAM
show running-config
command that lists the configuration currently in nvram
show startup-config
command to copy the configuration in RAM into NVRAM
copy running-config startup-config
what is the address that is defined by the TCP/IP protocol as a reserved address that routes packets back to the host.
loopback address 127.0.0.1