Module 2 Flashcards
the portion of the OS that interacts directly with computer hardware is known as the
kernel
The portion that interfaces with applications and the user is known as the
shell
When using a _____ the user interacts directly with the system in a text-based environment by entering commands on the keyboard at a command prompt
CLI (Command Line Interface)
A _______ such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows
GUI (graphical user interface)
Regarding Operating systems.. The ____ is less resource intensive and very stable when compared to a ____.
CLI; GUI
network devices are typically accessed through a
CLI
The operating system on home routers is usually called
firmware
The most common method for configuring a home router is by using a web browser-based
GUI
This is a physical management port that provides out-of-band access to a Cisco device
Console
refers to access via a dedicated management channel that is used for device maintenance purposes only
out-of-band access
an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.
Secure Shell (SSH)
an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network
Telnet
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured?
Console
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?
Console
Which access method would be the most appropriate in-band access to the IOS over a network connection?
Telnet/SSH
Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection?
Aux
Mode allows access to only a limited number of basic monitoring commands.
It is often referred to as “view-only” mode.
User Exec Mode
Mode allows access to all commands and features.
The user can use any monitoring commands and execute configuration and management commands.
Priviliged EXEC mode
Default Device Prompt for User Exec Mode
Switch>
Router>
Default Device Prompt for Priviliged exec mode
Switch #
Router #
identified by a prompt that ends with (config)# after the device name, such as Switch(config)#.
Global Configuration Mode
From global config mode, the user can enter different
subconfiguration modes.
Used to configure console, SSH, Telnet, or AUX access.
Line Configuration Mode
Used to configure a switch port or router network interface.
Interface Configuration Mode
By default, every prompt begins with…
Following the name, the remainder of the prompt indicates the….
the device name.
mode.
To move from user EXEC mode to privileged EXEC mode, use the
Enable Command
Use the disable privileged EXEC mode command to return to…
user EXEC mode.
Privileged EXEC mode is sometimes called
Enable Mode
To move from any sub configuration mode to the privileged EXEC mode, enter the end command or….
enter the key combination Ctrl+Z.
To enter global configuration mode type
configure terminal
Enter line subconfiguration mode for the console port , type…
line console 0
Enter VTY line subconfiguration by typing…
line vty 0 15
Enter the VLAN 1 interface subconfiguration mode by typing…
interface vlan 1
Which IOS mode allows access to all commands and features?
Privileged EXEC mode
Which IOS mode are you in if the Switch(config)# prompt is displayed?
Global configuration mode
Which IOS mode are you in if the Switch> prompt is displayed?
User EXEC mode.
CTRL+Z and end will return you to the ________________ regardless of the configuration mode you are in.
privileged EXEC prompt
The general syntax for a command is the command followed by ….
any appropriate keywords and arguments.
This is a specific parameter defined in the operating system
Keyword
This is not predefined; it is a value or variable defined by the user
Argument
text indicates arguments for which you supply values.
italics
text indicates commands and keywords that you enter literally as shown.
boldface
____ indicate an optional element (keyword or argument).
square brackets [x]
____- indicate a required element (keyword or argument).
Braces {x}
____ indicate a required choice within an optional element
Braces and vertical lines within square brackets
[x {y | z } ]
What is the command to assign the name “Sw-Floor-2” to a switch?
hostname (in bold) Sw-Floor-2
How is the privileged EXEC mode access secured on a switch?How is the privileged EXEC mode access secured on a switch?
enable secret class
*all in bold
Which command enables password authentication for user EXEC mode access on a switch?
login (bold)
Which command encrypts all plaintext passwords access on a switch?
service password-encryption
*all in bold
Which is the command to configure a banner to be displayed when connecting to a switch?
banner motd $ Keep out $
*all in bold
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.
startup-config
This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
running-config
The show running-config privileged EXEC mode command is used to
view the running config
a 32-bit value that differentiates the network portion of the address from the host portion
IPv4 subnet mask
The structure of an IPv4 address is called
dotted decimal notation
the IP address of the router that the host will use to access remote networks, including the internet.
The default gateway address
How is an IPv4 address represented?
four decimal numbers between 0 and 22 separated by periods.
What type of interface has no physical port associated with it?
switch virtual interface (SVI)
how to manually configure an IPv4 address on a Windows host, you open the….
Control Panel > Network Sharing Center > Change adapter settings and choose the adapter.
Then right-click and select Properties to display the Local Area Connection Properties.
enables automatic IPv4 address configuration for every end device
DHCP ( Dynamic host configuration protocol)
This affects the operation of the device immediately when modified…
running configuration file in a Cisco IOS device
Which type of access is secured on a Cisco router or switch with the enable secret command?
privliged EXEC
What is the default SVI on a Cisco switch?
VLAN1
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines?
fewer than 64 characters in length.
contain no spaces.
begin with a letter.
What is the function of the shell in an OS?
Interfaces between the users and the kernel.
A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?
user EXEC mode
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
Nothing must be done.
Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
Which memory location on a Cisco router or switch will lose all content when the device is restarted?
RAM
Why would a technician enter the command copy startup-config running-config?
to copy an existing configuration into RAM
Main functionality is provided by DHCP?
automatic assignment of an IP address to each host.
Which memory location on a Cisco router or switch stores the startup configuration file?
NVRAM
Exec command that Opens a terminal connection.
connect
Exec command that turns off priviliged commands
disable
exec command that disconnects an existing network connection.
disconnect
exec command that turns on priviliged commands
enable