Module 2 Flashcards
the portion of the OS that interacts directly with computer hardware is known as the
kernel
The portion that interfaces with applications and the user is known as the
shell
When using a _____ the user interacts directly with the system in a text-based environment by entering commands on the keyboard at a command prompt
CLI (Command Line Interface)
A _______ such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows
GUI (graphical user interface)
Regarding Operating systems.. The ____ is less resource intensive and very stable when compared to a ____.
CLI; GUI
network devices are typically accessed through a
CLI
The operating system on home routers is usually called
firmware
The most common method for configuring a home router is by using a web browser-based
GUI
This is a physical management port that provides out-of-band access to a Cisco device
Console
refers to access via a dedicated management channel that is used for device maintenance purposes only
out-of-band access
an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.
Secure Shell (SSH)
an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network
Telnet
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured?
Console
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?
Console
Which access method would be the most appropriate in-band access to the IOS over a network connection?
Telnet/SSH
Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection?
Aux
Mode allows access to only a limited number of basic monitoring commands.
It is often referred to as “view-only” mode.
User Exec Mode
Mode allows access to all commands and features.
The user can use any monitoring commands and execute configuration and management commands.
Priviliged EXEC mode
Default Device Prompt for User Exec Mode
Switch>
Router>
Default Device Prompt for Priviliged exec mode
Switch #
Router #
identified by a prompt that ends with (config)# after the device name, such as Switch(config)#.
Global Configuration Mode
From global config mode, the user can enter different
subconfiguration modes.
Used to configure console, SSH, Telnet, or AUX access.
Line Configuration Mode
Used to configure a switch port or router network interface.
Interface Configuration Mode
By default, every prompt begins with…
Following the name, the remainder of the prompt indicates the….
the device name.
mode.
To move from user EXEC mode to privileged EXEC mode, use the
Enable Command
Use the disable privileged EXEC mode command to return to…
user EXEC mode.
Privileged EXEC mode is sometimes called
Enable Mode
To move from any sub configuration mode to the privileged EXEC mode, enter the end command or….
enter the key combination Ctrl+Z.
To enter global configuration mode type
configure terminal