Infrastructure Maintenance Flashcards

1
Q

What does the “show ssh” command do?

A

It will display the status of current ssh connections to the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What does the “show ip ssh” command do?

A

It will display the version and configuration data on a Cisco router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

True of False; The commands “show cdp neighbor” and “show interface” provide Layer 3 information?

A

False. They provide Layer 2 information.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

True of False: Ping is used to verify and troubleshoot layer 3 issues

A

True.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the Default Sequence in which a router searches for IOS Image upon power on?

A

Flash, TFTP, ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which command will let you see the current operating mode for a switch port?

A

show interfaces fastethernet0/1 switchport

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which two Security Features can be configured to prevent unauthorised access into a network through a network device?

A

Authentication and Traffic Filtering.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

List the Steps to recover access to a Cisco device after the loss of the password?

A

Reboot the router
Enter Router Diagnostic mode - ROMMON
Boot into the ios with out the saved configuration
Copy startup-configuration to running-configuration
Configure the Enable Secret password
Save the Current configuration and reboot.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What situation could cause a switch to enter initial configuration mode upon booting?

A

Corrupt or missing configuration file in the NVRAM memory.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What are 2 limitations of the Command “service password-encryption”?

A

It uses the Vigenere cipher algorithm. which does not protect the configuration file against details analysis by attackers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What command should you use to suspend a telnet session and return to the device you connected from

A

x

How well did you know this?
1
Not at all
2
3
4
5
Perfectly