Module 2: Basic Switch and End Device Configuration Flashcards

1
Q

What is Secure Shell (SSH)

A

Secure Shell (SSH)
Establishes a secure remote CLI connection to a device, through a virtual interface, over a network.
- Note: This is the recommended method for remotely connecting to a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is Telnet

A

Telnet
Establishes an insecure remote CLI connection to a device over the network
- Note: User authentication, passwords and commands are sent over the network in plaintext

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Give examples of Terminal Emulation Programs

A

Terminal Emulation Programs
Used to connect to a network device by either a console port or by an SSH/Telnet connection
There are Several Terminal Emulation Programs
- PuTTY
- Tera Term
- SecureCRT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is User EXEC Mode? and What kind of commands can be accessed in User EXEC Mode?

A

User EXEC Mode allows access to only a limited number of basic monitoring commands and is identified by the CLI prompt that ends with the > symbol.
In User EXEC Mode, only a limited number of basic monitoring commands can be accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Privileged EXEC Mode? and What kind of commands can be accessed in Privileged EXEC Mode?

A

Privileged EXEC Mode allows access to all commands and features and is identified by the CLI prompt that ends with the # symbol.
In Privileged EXEC Mode, all commands and features can be accessed.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Global Configuration Mode used for?

A

Global Configuration Mode is used to access configuration options on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is Line Configuration Mode used for?

A

Line Configuration Mode is used to configure console, SSH, Telnet, or AUX access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Interface Configuration Mode used for?

A

Interface Configuration Mode is used to configure a switch port or router interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the function of the Ctrl-Shift-6 hotkey or shortcut in networking?

A

All-purpose break sequences used to abort DNS lookups, traceroutes, pings, etc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the guideline for naming devices

A

Guideline for naming devices
- Start with a letter
- Contain no spaces
- End with a letter or digit
- Use only letters, digits, and dashes
- Be less than 64 characters in length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the password Guidelines - Characters

A

Password Guidelines - Characters
Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences
Password Guidelines - Avoid
Avoid using the same password for all devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

How can you secure User EXEC Mode access in networking devices?

A

You can secure User EXEC Mode access in networking devices by following these steps:

1 Enter line console configuration mode using the “line console 0” command in global configuration mode.
2 Specify the user EXEC mode password using the “password password” command.
3 Enable user EXEC access using the “login” command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the steps to secure Privileged EXEC mode access in networking devices?

A

The steps to secure Privileged EXEC mode access in networking devices are:

1 Enter global configuration mode.
2 Use the “enable secret password” command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the steps to secure VTY line access in networking devices?

A

The steps to secure VTY line access in networking devices are:

1 Enter line VTY configuration mode using the “line vty 0 15” command in global configuration mode.
2 Specify the VTY password using the “password password” command.
3 Finally, enable VTY access using the “login” command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

How can you encrypt passwords in the startup-config and running-config files in networking devices?

A

You can encrypt passwords in the startup-config and running-config files in networking devices by following these steps:

To encrypt all plaintext passwords, use the “service password-encryption” global config command.
Use the “show running-config” command to verify that the passwords on the device are now encrypted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the startup-config file in networking devices? and the running-config file in networking devices?

A

A: The startup-config file is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.

B: The running-config file is stored in Random Access Memory (RAM). It reflects the current configuration.

17
Q

What is the structure of an IPv4 address in networking?

A

The structure of an IPv4 address in networking is called dotted decimal notation and is represented by four decimal numbers between 0 and 255.

18
Q

What is the IPv4 subnet mask in networking devices? and how is the IPv4 subnet mask coupled with the IPv4 address in networking devices?

A

A: The IPv4 subnet mask is a 32-bit value that differentiates the network portion of the address from the host portion.

B: The subnet mask determines to which subnet the device is a member when coupled with the IPv4 address.

19
Q

What is a Default Gateway Address

A

The IP address of the router that the host will use to access remote networks, including the internet

20
Q

What is the length of an IPv6 address and how is it represented in hexadecimal format?

A

IPv6 Addresses is:
- 128 bits in length and written as a string of hexadecimal values
- Every four bits is represented by a single hexadecimal digit; for a total of 32 hexadecimal values
- Groups of four hexadecimal digits are separated by a colon
IPv6 addresses are not case-sensitive and can be written in either lowercase or uppercase

21
Q

What are the Types of Network Media

A
  • Twisted-pair copper cables
  • Fiber-optic cables
  • Coaxial cables
  • Wireless
22
Q

What are the two methods for entering IPv4 address information into end devices, and which one uses Dynamic Host Configuration Protocol (DHCP)?

A

IPv4 address information can be entered into end devices manually, or automatically using Dynamic Host Configuration Protocol (DHCP)

23
Q

What are the three steps to configure a Switch Virtual Interface (SVI) and access a switch remotely?

A

Switch Virtual Interface Configuration
To access the switch remotely, an IP address and a subnet mask must be configured on the SVI

To configure a Switch Virtual Interface (SVI) -
Step 1 Enter the interface vlan 1 command in global configuration mode
Step 2 Assign an IPv4 address using the ip address ip-address subnet-mask command
Step 3 Finally, enable the virtual interface using the no shutdown command