module 2 Flashcards

(39 cards)

1
Q

The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.

A

Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The physical part of a computer including underlying electronics.

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

allows the user to interact with the system using an environment of graphical icons, menus, and windows

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

enables a user to do the following:
Use a mouse to make selections and run programs
Enter text and text-based commands

A

PC operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

enables a network technician to do the following:
Use a keyboard to run CLI-based network programs
Use a keyboard to enter text and text-based commands
View output on a monitor

A

CLI-based network operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A physical management port used to access a device in order to provide maintenance, such as performing the initial configurations

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.)

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords and commands are sent over the network in plaintext.)

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

are used to connect to a network device by either a console port or by an SSH/Telnet connection.

A

Terminal emulation programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Allows access to only a limited number of basic monitoring commands

Identified by the CLI prompt that ends with the > symbol

A

User EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Allows access to all commands and features

Identified by the CLI prompt that ends with the # symbol

A

Privileged EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Used to access configuration options on the device

○ Identified by a prompt that
ends with (config)# after
the device name

A

Global Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Used to configure console, SSH, Telnet or AUX access

The default prompt is device
name (config-line)#

A

Line Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used to configure a switch port or router interface

The default prompt is device
name (config-if)#

A

Interface Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

To move from user EXEC mode to privilege EXEC mode, use the enabled command

A

Privileged EXEC Mode

17
Q

To move in and out of global configuration mode, use the configure terminal command. To return to privilege EXEC mode, use the exit command

A

Global Configuration Mode

18
Q

To move in and out of line configuration mode, use the line command followed by the management line type. To return to global configuration mode, use the exit command.

A

Line Configuration Mode

19
Q

To move out of any subconfiguration mode to get back to global configuration mode, use the exit command. To return to privilege EXEC mode, use the end command or key combination Ctrl +Z.

A

Subconfiguration Modes

20
Q

This is a specific parameter defined in the operating system (in the figure,ip protocols).

21
Q

This is not predefined; it is a value or variable defined by the user (in the figure,192.168.10.5).

22
Q

provides the pattern, or format, that must be used when entering a command.

A

command syntax

23
Q

The command is___and the user-defined argument is theip-addressof the destination device. For example,ping 10.10.10.5.

24
Q

The command is___and the user-defined argument is theip-addressof the destination device. For example,traceroute 192.168.254.254.

25
enables you to quickly find answers to these questions: ○ Which commands are available in each command mode? ○ Which commands start with specific characters or group of characters? ○ Which arguments and keywords are available to particular commands?
Context-sensitive help
26
verifies that a valid command was entered by the user
Command syntax check
27
Completes a partial command name entry
Tab
28
Erases the character to the left of the cursor
Backspace
29
Moves the cursor one character to the left
Left Arrow or Ctrl+B
30
Moves the cursor one character to the right
Right Arrow or Ctrl+F
31
Recalls the commands in the history buffer, beginning with the most recent commands
Up Arrow or Ctrl+P
32
Displays the next line
Enter Key
33
Displays the next screen
Space Bar
34
Ends the display string, returning to privileged EXEC Mode
Any other key
35
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off
startup-config
36
This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
running-config
37
is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet.
IP addresses
38
The structure of an IPv4 address is called ___ and is represented by four decimal numbers between 0 and 255.
dotted decimal notation
39
are 128 bits in length and written as a string of hexadecimal values.
IPv6 addresses