Elective 1: Midterm Flashcards

1
Q

PURPOSE:
* Allow you to connect with remote devices, perform basic tests, temporary change terminal setting, list system information
PROMPT:
* ___

A

✧ User EXEC
Switch >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

COMMAND TO ENTER:
* Default mode after booting. Login with password, if configured.

A

✧ User EXEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PURPOSE:
* Allow you to set operating parameters. It also includes high level testing and list commands like show, copy, debug.
PROMPT:
___

A

✧ Privileged EXEC
* Switch #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COMMAND TO ENTER:
* Use enable command from user exec mode

A

✧ Privileged EXEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COMMAND TO ENTER:
* Use configure terminal command from privileged exec mode

A

✧ Global Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PURPOSE:
* Contain commands those affect the entire system
PROMPT:
* ___

A

✧ Global Configuration
Switch (config)#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Default mode after booting

A

Switch >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Note: This command allows you to enter into privileged exec mode / enable mode, where you can configure a range of commands.

A

Switch > enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Note: This command allows you to enter into Global Configuration Mode, where you configure a wide range of commands which effect the entire system.

A

Switch #
Switch # configure terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_ is a special character which is uses before starting and ending of a message.

A

#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Setting a Banner
When someone connects to the Switch , the MOTD ( Message of the Day ) banner appears before the login prompt.

A

GIFT > enable
GIFT # configure terminal
GIFT ( config ) # banner motd # WELCOME TO GIFT #
GIFT ( config ) # exit
GIFT >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Changing Hostname

A

Switch > enable
Switch # configure terminal
Switch (config ) # hostname GIFT
GIFT ( config ) # exit
GIFT #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Some Basic Switch Commands

A
  1. ?
  2. Enable
  3. Configure Terminal
  4. Tab
  5. Show Version
  6. Show-Mac-Table
  7. Show IP Interfaces Brief
  8. Show Vlan
  9. Show running configuration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Use to show commands in any mode

COMMAND: __

A

?

Switch > ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use to enter into privileged mode

COMMAND: __

A

Enable

Switch > enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use to enter into Global confi. Mode

COMMAND:
_

A

Configure Terminal

Switch # Configure Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use to complete the command

COMMAND: _

A

Tab

Switch # confi term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use to show the Hardware Information

COMMAND: _

A

Show Version

Switch # show version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Use to show the MAC Address Table

COMMAND:
_

A

Show-Mac-Table

Switch # show mac-address-
table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Use to show the information about IP interfaces

COMMAND: _

A

Show IP Interfaces Brief

Switch # show ip interface
brief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Use to show information about VLANs

COMMAND: _

A

Show Vlan

Switch # show vlan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Use to show information about running configuration

COMMAND: _

A

Show running configuration

Switch # show running-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_ is use to save current configuration into NVRAM - Non-volatile

A

Write Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Line Console Password

A

GIFT > enable
GIFT # configure terminal
GIFT (config) # line console 0
GIFT (config-line) # password TEST123
GIFT (config-line) # login
GIFT (config-line) # exit
GIFT (config ) # exit
GIFT # exit
GIFT > enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Note: _ is used for checking enable password.

A

Login command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Password for Privileged Mode

A

GIFT > enable
GIFT # configure terminal
GIFT (config) # enable password TEST123
GIFT (config ) # exit
GIFT #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Removing Line Console Password

A

GIFT > enable
GIFT # configure terminal
GIFT (config) # line console 0
GIFT (config-line) # no login
GIFT (config-line) # no password
GIFT (config-line) # end
GIFT #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Removing Password for Privileged Exec Mode

A

GIFT > enable
GIFT # configure terminal
GIFT (config) # no enable password
GIFT (config-line) # end
GIFT #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

_ is the address of device in network.

_ allows us to set IP address on interface level.

_ is used to manage that particular interface.

To _ we have to assign IP address to VLAN1( Default VLAN of switch). Also set default gateway IP address from global configuration mode.

A

IP address
Switch
IP address assigned on interface
manage entire switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Basic Steps to Configure a Router

A
  1. Configure hostname
  2. Configure passwords
    * Enable / enable secret
    * Console (con 0)
    * Virtual terminal (vty)
  3. Configure interfaces
  4. Configure routing protocol
  5. Configure hostname table
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Configuring the Router Hostname

A

Router#config t
Router(config)#hostname Router_A
Router_A(config)#exit / end
Router_A#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Password Configuration

  • Passwords are set for:
A
  • privileged EXEC mode
  • line passwords
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q
  • Setting Passwords are set for:
    • privileged EXEC mode
      • Enable password
A

Router(config)#enable password cisco

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q
  • Enable secret password
A

Router(config)#enable secret class

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

show commands

A
  • show interfaces
  • show controllers serial
  • show clock
  • show hosts
  • show users
  • show history
  • show flash
  • show version
  • show ARP
  • show protocol
  • show startup-configuration
  • show running-configuration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q
  • line passwords
    • console interface
A
  • Router(config)#line console 0
    *Router(config-line)#password cisco
    *Router(config-line)#login
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  • VTY (virtual terminals)
A
  • Router(config)#line vty 0 4
    *Router(config-line)#password cisco
    *Router(config-line)#login
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

stats on the router interfaces

A

show interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

hardware info re: serial interfaces

A

show controllers serial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Shows the wall-time clock in the router

A

show clock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Displays a cached list of host names and addresses

A

show hosts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

history of commands executed

A

show history

39
Q

Displays all users who are connected to the router

A

show users

40
Q

info about flash memory and its IOS

A

show flash

41
Q

Displays the ARP table of the router

A

show ARP

41
Q

info about router and IOS running in RAM

A

show version

42
Q

Displays the global and interface specific status of each configured Layer 3 protocol

A

show protocol

42
Q

Displays the configuration currently in RAM

A

show running-configuration

43
Q

Displays the saved configuration located in NVRAM

A

show startup-configuration

44
Q

Configuring a serial interface

A

Router#config t
Router(config)#interface serial 0/0/0
Router(config-if)#ip address 192.10.10.1 255.255.255.0
Router(config-if)#clock rate 64000 (if DCE is connected)
Router(config-if)#no shutdown

45
Q

A _ is by default administratively down, until it is brought up

A

router

46
Q

The _ is the determining factor with regard to DTE or DCE not the router. One end of the cable is always a DTE and the other is always a DCE.

A

cable
DTE or DCE

46
Q

A _ is by default a _ – If connecting one router to another one interface must define the clock – the DCE end of the cable (wire).

A

router
DTE Device

47
Q

Configuring an Ethernet interface

A

Router#config t
Router(config)#interface fastethernet 0/0
Router(config-if)#ip address 192.10.10.1 255.255.255.0
Router(config-if)#no shutdown

48
Q
  • Can convey message to all users
  • Might want to include a warning not to access the device
  • Use a delimiting character before and after “ _ “

Router#config t
Router(config)#banner motd # Authorized Users Only!!! #

A

Login Banners
#

49
Q

Saving Configuration Files
Save the Router configuration using the:

A

copy running-config startup-config
command.

Router#copy running-config startup-config
Building configuration…
[OK]
Router#

50
Q

The cheapest cable use in computer in networking is the _ cable. Other use the _ cable which is cost much than _ but more reliable.

A

UTP CABLE
UTP (Unshielded Twisted Pair)
STP (Shielded Twisted Pair)
UTP

51
Q

RJ means _. This is a standard physical Network Interface used for connecting telecommunications equipment commonly, a computer networking equipment.

A

RJ45
Registered Jack

52
Q

_ is used to join the RJ-45 and RJ-11 connectors to the both ends of either phone or CAT5 cable.

A

CRIMPER
Crimping tool

53
Q

A tool designed to remove the protective covering (jacket) off of a cable to expose the inner wires. Because different wires come in different shapes, there are dozens of different wire strippers available.

A

WIRE STRIPPER

54
Q

A cable tester is a device that is used to test the strength and connectivity of a particular type of cable or other wired assemblies.

A

LAN TESTER

55
Q

is also referred to as an Ethernet card and network adapter. It is an expansion card that enables a computer to connect to a network;

A

Network Interface Card or NIC

56
Q

CROSSOVER

A

SIDE ONE:
White Orange
Orange
White Green
Blue
White Blue
Green
White Brown
Brown

SIDE TWO:
White Green
Green
White Orange
Blue
White Blue
Orange
White Brown
Brown

57
Q

Use Crossover Cables For The Following Cabling:

A
  • Switch to switch
  • Switch to hub
  • Hub to hub
  • Router to router
  • Router Ethernet port to PC NIC
  • PC to PC
58
Q

STRAIGHT-THROUGH CABLING

A

SAME ANG SIDE ONE & TWO:
White Orange
Orange
White Green
Blue
White Blue
Green
White Brown
Brown

59
Q
  • A backup plan that is designed to restore and recover data and computer functionality in the event of a disaster such as a computer or server failure
A

Computer Disaster Recovery Plan

60
Q
  • What can happen when there is no computer disaster recovery plan?
A
  • company/customer data is lost
  • company operations may become disrupted
  • operations may never return to the pre-disaster state
61
Q
  • What can happen when there is no computer disaster recovery plan?
A
  • Software Failure
  • Hardware Failure
62
Q

a crash or cessation of processing because of a logic error in a
program or key files have become corrupt or damaged

A
  • Software Failure
63
Q

computers fail in varying degrees of severity. The
worst failures impact the ability for the computer to function at all

A
  • Hardware Failure
64
Q

The computer is unable to load the operating system

A
  • Hard drive failure
65
Q

Software can affect hardware by corrupting its firmware and causing the hardware to overheat and fail.

A
  • Other component failure
66
Q

The screen will be black with no signal.

A
  • Video card failure
67
Q

making copies of important data, files, and computer system settings

A

Data backup

67
Q
  • Preventative strategies:
A
  • data backup
  • redundant hardware setups
  • security software
  • defragmentation
  • proper cooling
68
Q
  • On-site backups
A
  • Raid 0
  • Manual on-site backup
69
Q
  • The computer has two of the same-sized hard drives where the same data is written to both drives
    —– Is performed through BIOS and operating system settings
    —– Quickest means of recovery when a hard drive failure occurs because of the system’s redundancy
A
  • Raid 0
70
Q

Data is backed up to another drive or location at regular intervals

A

Manual on-site backup

71
Q

Utilizes servers or cloud-based systems for backup locations

A
  • Off-Site Backup
72
Q
  • software applications are designed to protect the computer and its systems
    — Antivirus, Firewall, and other security software suites allow for better protection of a computer’s files and systems
A
  • Security software
73
Q

the process where files on the hard drive are put back into their proper order, increasing performance and proper file management

A
  • Defragmentation
74
Q

heat causes hardware failures. Proper cooling is necessary for a computer to operate correctly

A
  • Proper cooling
75
Q

Looking at the activity log is helpful in troubleshooting the computer

A
  • System performance test
76
Q

Detection strategies

A
  • software notifications
  • system performance tests
  • user detection
76
Q

Computer Disaster Recovery Plan: ____

  • ____: Operating systems today incorporate some form of software or hardware diagnostic tool to aid the user in troubleshooting the computer
    – They are designed to notify the user of a potential malfunction or
    to run a check for a fault
A

Detection
* Software notifications

77
Q

The user generally knows what is supposed to happen with a particular software package or operating system. When things don’t work the way they are supposed to, a user detects the problem

A
  • User Detection
78
Q

Corrective/Reactive strategies

A
  • identify the problem
  • assess the areas that are affected
  • repair or replace the affected hardware/software
  • confirm through testing that the problem has been corrected
78
Q

Computer Disaster Recovery Plan: ___
⚫____
⚫___

A

Corrective Strategy
⚫Identify the problem
⚫What is affected

79
Q

: Is the problem software or hardware related?

A

⚫Identify the problem

80
Q

diagnose hardware failures using the utility that comes pre-installed with the operating system. Replace any hardware that might be faulty. Software is usually diagnosed by the user or with the appearance of error messages

A

⚫What is affected:

81
Q
  • ___: repair/restore/reinstall software when it fails to function correctly.
  • ____: Replace faulty hardware and reinstall drivers as necessary
    — Confirm through testing that the problem has been resolved
A
  • Repair/Replace
  • ___: repair/restore/reinstall software when it fails to function correctly.
  • ____: Replace faulty hardware and reinstall drivers as necessary
82
Q
  • The process and practice of keeping a computer in good working
    order
A

COMPUTER PREVENTATIVE MAINTENANCE

83
Q

COMPUTER PREVENTATIVE MAINTENANCE

A
  • Involves maintaining both the hardware and the software on the
    computer
84
Q

COMPUTER PREVENTATIVE MAINTENANCE

A
  • Should be performed every 3-6 months
85
Q

COMPUTER PREVENTATIVE MAINTENANCE
* Hardware

A
  • Listen
  • Clean dust out
  • Look at computer specs
86
Q
  • make note of the hardware in the machine
  • As a computer ages, it has trouble keeping up with newer software requirements
A

Look at computer specs

87
Q

while the computer is running, listen for odd sounds such as clicking or other abnormal noises

A

Listen

88
Q
  • using a vacuum, place suction at both the exhaust and intake vents on the computer where buildup is visible
  • This returns airflow to components that generate heat and allows the machine to run more efficiently while decreasing the likelihood of failure
  • Canned air is also an option for blowing dust from a computer. Open the case for best results
A

clean dust out

88
Q

make copies of important files. Can be done on external media, a hard drive, online backup, or to a virtual location like the cloud

A

Backup

89
Q

COMPUTER PREVENTATIVE MAINTENANCE
* Software

A
  • Backup
  • Check computer security
  • Empty cache, delete any unwanted or temp files
  • Update drivers
89
Q
  • periodically, perform an entire scan of the computer’s hard drive
  • To perform a scan, open the security software application and select the complete system scan
  • Make note of security software renewal dates. If the subscription has expired, you will not have active protection.
A

Check computer security

90
Q

The reason for preventative maintenance

A
  • to prevent unnecessary and premature hardware failures
  • to ensure that software is up to date and functioning at optimal levels
  • for an extra degree of protection in backing up key files and documents
  • to help extend the life of the computer
91
Q

will enhance the computer’s performance and make it more stable

A

Update drivers

92
Q

clear the cookies from your Internet browser, delete emails, empty the trash, and delete any temporary files by performing a disk cleanup and defragmentation of the hard drive

A

Empty cache, delete any unwanted or temp files