Elective 1: Midterm Flashcards
PURPOSE:
* Allow you to connect with remote devices, perform basic tests, temporary change terminal setting, list system information
PROMPT:
* ___
✧ User EXEC
Switch >
COMMAND TO ENTER:
* Default mode after booting. Login with password, if configured.
✧ User EXEC
PURPOSE:
* Allow you to set operating parameters. It also includes high level testing and list commands like show, copy, debug.
PROMPT:
___
✧ Privileged EXEC
* Switch #
COMMAND TO ENTER:
* Use enable command from user exec mode
✧ Privileged EXEC
COMMAND TO ENTER:
* Use configure terminal command from privileged exec mode
✧ Global Configuration
PURPOSE:
* Contain commands those affect the entire system
PROMPT:
* ___
✧ Global Configuration
Switch (config)#
Default mode after booting
Switch >
Note: This command allows you to enter into privileged exec mode / enable mode, where you can configure a range of commands.
Switch > enable
Note: This command allows you to enter into Global Configuration Mode, where you configure a wide range of commands which effect the entire system.
Switch #
Switch # configure terminal
_ is a special character which is uses before starting and ending of a message.
#
Setting a Banner
When someone connects to the Switch , the MOTD ( Message of the Day ) banner appears before the login prompt.
GIFT > enable
GIFT # configure terminal
GIFT ( config ) # banner motd # WELCOME TO GIFT #
GIFT ( config ) # exit
GIFT >
Changing Hostname
Switch > enable
Switch # configure terminal
Switch (config ) # hostname GIFT
GIFT ( config ) # exit
GIFT #
Some Basic Switch Commands
- ?
- Enable
- Configure Terminal
- Tab
- Show Version
- Show-Mac-Table
- Show IP Interfaces Brief
- Show Vlan
- Show running configuration
Use to show commands in any mode
COMMAND: __
?
Switch > ?
Use to enter into privileged mode
COMMAND: __
Enable
Switch > enable
Use to enter into Global confi. Mode
COMMAND:
_
Configure Terminal
Switch # Configure Terminal
Use to complete the command
COMMAND: _
Tab
Switch # confi term
Use to show the Hardware Information
COMMAND: _
Show Version
Switch # show version
Use to show the MAC Address Table
COMMAND:
_
Show-Mac-Table
Switch # show mac-address-
table
Use to show the information about IP interfaces
COMMAND: _
Show IP Interfaces Brief
Switch # show ip interface
brief
Use to show information about VLANs
COMMAND: _
Show Vlan
Switch # show vlan
Use to show information about running configuration
COMMAND: _
Show running configuration
Switch # show running-config
_ is use to save current configuration into NVRAM - Non-volatile
Write Command
Line Console Password
GIFT > enable
GIFT # configure terminal
GIFT (config) # line console 0
GIFT (config-line) # password TEST123
GIFT (config-line) # login
GIFT (config-line) # exit
GIFT (config ) # exit
GIFT # exit
GIFT > enable
Note: _ is used for checking enable password.
Login command
Password for Privileged Mode
GIFT > enable
GIFT # configure terminal
GIFT (config) # enable password TEST123
GIFT (config ) # exit
GIFT #
Removing Line Console Password
GIFT > enable
GIFT # configure terminal
GIFT (config) # line console 0
GIFT (config-line) # no login
GIFT (config-line) # no password
GIFT (config-line) # end
GIFT #
Removing Password for Privileged Exec Mode
GIFT > enable
GIFT # configure terminal
GIFT (config) # no enable password
GIFT (config-line) # end
GIFT #
_ is the address of device in network.
_ allows us to set IP address on interface level.
_ is used to manage that particular interface.
To _ we have to assign IP address to VLAN1( Default VLAN of switch). Also set default gateway IP address from global configuration mode.
IP address
Switch
IP address assigned on interface
manage entire switch
Basic Steps to Configure a Router
- Configure hostname
- Configure passwords
* Enable / enable secret
* Console (con 0)
* Virtual terminal (vty) - Configure interfaces
- Configure routing protocol
- Configure hostname table
Configuring the Router Hostname
Router#config t
Router(config)#hostname Router_A
Router_A(config)#exit / end
Router_A#
Password Configuration
- Passwords are set for:
- privileged EXEC mode
- line passwords
- Setting Passwords are set for:
- privileged EXEC mode
- Enable password
- privileged EXEC mode
Router(config)#enable password cisco
- Enable secret password
Router(config)#enable secret class
show commands
- show interfaces
- show controllers serial
- show clock
- show hosts
- show users
- show history
- show flash
- show version
- show ARP
- show protocol
- show startup-configuration
- show running-configuration
- line passwords
- console interface
- Router(config)#line console 0
*Router(config-line)#password cisco
*Router(config-line)#login
- VTY (virtual terminals)
- Router(config)#line vty 0 4
*Router(config-line)#password cisco
*Router(config-line)#login
stats on the router interfaces
show interfaces
hardware info re: serial interfaces
show controllers serial
Shows the wall-time clock in the router
show clock
Displays a cached list of host names and addresses
show hosts
history of commands executed
show history
Displays all users who are connected to the router
show users
info about flash memory and its IOS
show flash
Displays the ARP table of the router
show ARP
info about router and IOS running in RAM
show version
Displays the global and interface specific status of each configured Layer 3 protocol
show protocol
Displays the configuration currently in RAM
show running-configuration
Displays the saved configuration located in NVRAM
show startup-configuration
Configuring a serial interface
Router#config t
Router(config)#interface serial 0/0/0
Router(config-if)#ip address 192.10.10.1 255.255.255.0
Router(config-if)#clock rate 64000 (if DCE is connected)
Router(config-if)#no shutdown
A _ is by default administratively down, until it is brought up
router
The _ is the determining factor with regard to DTE or DCE not the router. One end of the cable is always a DTE and the other is always a DCE.
cable
DTE or DCE
A _ is by default a _ – If connecting one router to another one interface must define the clock – the DCE end of the cable (wire).
router
DTE Device
Configuring an Ethernet interface
Router#config t
Router(config)#interface fastethernet 0/0
Router(config-if)#ip address 192.10.10.1 255.255.255.0
Router(config-if)#no shutdown
- Can convey message to all users
- Might want to include a warning not to access the device
- Use a delimiting character before and after “ _ “
Router#config t
Router(config)#banner motd # Authorized Users Only!!! #
Login Banners
#
Saving Configuration Files
Save the Router configuration using the:
copy running-config startup-config
command.
Router#copy running-config startup-config
Building configuration…
[OK]
Router#
The cheapest cable use in computer in networking is the _ cable. Other use the _ cable which is cost much than _ but more reliable.
UTP CABLE
UTP (Unshielded Twisted Pair)
STP (Shielded Twisted Pair)
UTP
RJ means _. This is a standard physical Network Interface used for connecting telecommunications equipment commonly, a computer networking equipment.
RJ45
Registered Jack
_ is used to join the RJ-45 and RJ-11 connectors to the both ends of either phone or CAT5 cable.
CRIMPER
Crimping tool
A tool designed to remove the protective covering (jacket) off of a cable to expose the inner wires. Because different wires come in different shapes, there are dozens of different wire strippers available.
WIRE STRIPPER
A cable tester is a device that is used to test the strength and connectivity of a particular type of cable or other wired assemblies.
LAN TESTER
is also referred to as an Ethernet card and network adapter. It is an expansion card that enables a computer to connect to a network;
Network Interface Card or NIC
CROSSOVER
SIDE ONE:
White Orange
Orange
White Green
Blue
White Blue
Green
White Brown
Brown
SIDE TWO:
White Green
Green
White Orange
Blue
White Blue
Orange
White Brown
Brown
Use Crossover Cables For The Following Cabling:
- Switch to switch
- Switch to hub
- Hub to hub
- Router to router
- Router Ethernet port to PC NIC
- PC to PC
STRAIGHT-THROUGH CABLING
SAME ANG SIDE ONE & TWO:
White Orange
Orange
White Green
Blue
White Blue
Green
White Brown
Brown
- A backup plan that is designed to restore and recover data and computer functionality in the event of a disaster such as a computer or server failure
Computer Disaster Recovery Plan
- What can happen when there is no computer disaster recovery plan?
- company/customer data is lost
- company operations may become disrupted
- operations may never return to the pre-disaster state
- What can happen when there is no computer disaster recovery plan?
- Software Failure
- Hardware Failure
a crash or cessation of processing because of a logic error in a
program or key files have become corrupt or damaged
- Software Failure
computers fail in varying degrees of severity. The
worst failures impact the ability for the computer to function at all
- Hardware Failure
The computer is unable to load the operating system
- Hard drive failure
Software can affect hardware by corrupting its firmware and causing the hardware to overheat and fail.
- Other component failure
The screen will be black with no signal.
- Video card failure
making copies of important data, files, and computer system settings
Data backup
- Preventative strategies:
- data backup
- redundant hardware setups
- security software
- defragmentation
- proper cooling
- On-site backups
- Raid 0
- Manual on-site backup
- The computer has two of the same-sized hard drives where the same data is written to both drives
—– Is performed through BIOS and operating system settings
—– Quickest means of recovery when a hard drive failure occurs because of the system’s redundancy
- Raid 0
Data is backed up to another drive or location at regular intervals
Manual on-site backup
Utilizes servers or cloud-based systems for backup locations
- Off-Site Backup
- software applications are designed to protect the computer and its systems
— Antivirus, Firewall, and other security software suites allow for better protection of a computer’s files and systems
- Security software
the process where files on the hard drive are put back into their proper order, increasing performance and proper file management
- Defragmentation
heat causes hardware failures. Proper cooling is necessary for a computer to operate correctly
- Proper cooling
Looking at the activity log is helpful in troubleshooting the computer
- System performance test
Detection strategies
- software notifications
- system performance tests
- user detection
Computer Disaster Recovery Plan: ____
- ____: Operating systems today incorporate some form of software or hardware diagnostic tool to aid the user in troubleshooting the computer
– They are designed to notify the user of a potential malfunction or
to run a check for a fault
Detection
* Software notifications
The user generally knows what is supposed to happen with a particular software package or operating system. When things don’t work the way they are supposed to, a user detects the problem
- User Detection
Corrective/Reactive strategies
- identify the problem
- assess the areas that are affected
- repair or replace the affected hardware/software
- confirm through testing that the problem has been corrected
Computer Disaster Recovery Plan: ___
⚫____
⚫___
Corrective Strategy
⚫Identify the problem
⚫What is affected
: Is the problem software or hardware related?
⚫Identify the problem
diagnose hardware failures using the utility that comes pre-installed with the operating system. Replace any hardware that might be faulty. Software is usually diagnosed by the user or with the appearance of error messages
⚫What is affected:
- ___: repair/restore/reinstall software when it fails to function correctly.
- ____: Replace faulty hardware and reinstall drivers as necessary
— Confirm through testing that the problem has been resolved
- Repair/Replace
- ___: repair/restore/reinstall software when it fails to function correctly.
- ____: Replace faulty hardware and reinstall drivers as necessary
- The process and practice of keeping a computer in good working
order
COMPUTER PREVENTATIVE MAINTENANCE
COMPUTER PREVENTATIVE MAINTENANCE
- Involves maintaining both the hardware and the software on the
computer
COMPUTER PREVENTATIVE MAINTENANCE
- Should be performed every 3-6 months
COMPUTER PREVENTATIVE MAINTENANCE
* Hardware
- Listen
- Clean dust out
- Look at computer specs
- make note of the hardware in the machine
- As a computer ages, it has trouble keeping up with newer software requirements
Look at computer specs
while the computer is running, listen for odd sounds such as clicking or other abnormal noises
Listen
- using a vacuum, place suction at both the exhaust and intake vents on the computer where buildup is visible
- This returns airflow to components that generate heat and allows the machine to run more efficiently while decreasing the likelihood of failure
- Canned air is also an option for blowing dust from a computer. Open the case for best results
clean dust out
make copies of important files. Can be done on external media, a hard drive, online backup, or to a virtual location like the cloud
Backup
COMPUTER PREVENTATIVE MAINTENANCE
* Software
- Backup
- Check computer security
- Empty cache, delete any unwanted or temp files
- Update drivers
- periodically, perform an entire scan of the computer’s hard drive
- To perform a scan, open the security software application and select the complete system scan
- Make note of security software renewal dates. If the subscription has expired, you will not have active protection.
Check computer security
The reason for preventative maintenance
- to prevent unnecessary and premature hardware failures
- to ensure that software is up to date and functioning at optimal levels
- for an extra degree of protection in backing up key files and documents
- to help extend the life of the computer
will enhance the computer’s performance and make it more stable
Update drivers
clear the cookies from your Internet browser, delete emails, empty the trash, and delete any temporary files by performing a disk cleanup and defragmentation of the hard drive
Empty cache, delete any unwanted or temp files