Module 2 (NetAcad) Flashcards

1
Q

All end devices and network devices require an ____

A

operating system (OS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The portion that interfaces with applications and the user is known as the ____

A

shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

the portion of the OS that interacts directly with computer hardware is known as the ____

A

kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The user can interact with the shell using a _____

A

command-line interface (CLI) or a graphical user interface (GUI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.

A

Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The physical part of a computer including underlying electronics

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

When using a ____ the user interacts directly with the system in a text-based environment by entering commands on the keyboard at a command prompt,

A

CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The ____ requires very little overhead to operate. However, it does require that the user have knowledge of the underlying command structure that controls the system.

A

CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A ____ such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows.

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

GUIs may not always be able to provide all the features available with the ___

A

CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ___ is less resource intensive and very stable when compared to a GUI.

A

CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The family of network operating systems used on many Cisco devices is called the _____

A

Cisco Internetwork Operating System (IOS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Give other Cisco operating systems

A
  • IOS XE
  • IOS XR
  • NX-OS
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The operating system on home routers is usually called ____. The most common method for configuring a home router is by using a web browser-based GUI.

A

firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

____ are similar to a PC operating system. Through a GUI, a PC operating system enables a user to do the following:

  • Use a mouse to make selections and run programs
  • Enter text and text-based commands
  • View output on a monitor
A

Network operating systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A ____ (e.g., the Cisco IOS on a switch or router) enables a network technician to do the following:

  • Use a keyboard to run CLI-based network programs
  • Use a keyboard to enter text and text-based commands
  • View output on a monitor
A

CLI-based network operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

(T or F) Is the IOS version is dependent on the type of device being used and the required features?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A ____ will forward traffic by default and does not need to be explicitly configured to operate.

For example, two configured hosts connected to the same new switch would be able to communicate.

A

switch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

This is a physical management port that provides out-of-band access to a Cisco device.

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

_____ access refers to access via a dedicated management channel that is used for device maintenancen purposes only.

A

Out-of-band

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the advantage of using a console port

A

Device is accessible even if no networking services are configured, such as performing the initial configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the required software and console for a console connection

A
  • Computer running terminal emulation software
  • Special console cable
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

___ is an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.

A

SSH (Secure Shell)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

(T or F) Does SSH connection require active networking services on the device, including an active interface configured with an address?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

____ is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network.

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Some devices, such as routers, may also support a____ that was used to establish a CLI session remotely over a telephone connection using a modem.

A

legacy auxiliary port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are some terminal emulation programs that you can use to connect to a networking device either by a sericla connection over a console port

A
  • PuTTY
  • Tera Term
  • SecureCRT
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Using the ___- may provide the network administrator with more precise control and flexibility than using the GUI.

30
Q

As a security feature, the Cisco IOS software separates management access into the following two command modes:

A
  • User EXEC Mode
  • Privileged EXEC Mode
31
Q

This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device.

A

User EXEC Mode

32
Q

To execute configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes, like global configuration mode, can only be reached from ___

A

privileged EXEC mode.

33
Q
  • Mode allows access to only a limited number of basic monitoring commands
  • It is often reffered to as “view-only” mode
A

User EXEC Mode

34
Q
  • Mode allows access to all commands and features
  • The user can use any monitoring commands and execute configureation and management commands
A

Privileged EXEC Mode

35
Q

What is this mode?
Switch>
Router>

A

User EXEC Mode

36
Q

What is this mode?
Switch#
Router#

A

Privileged EXEC Mode

37
Q

To configure the device, the user must enter global configuration mode, which is commonly called ____

A

global config mode.

38
Q

____is identified by a prompt that ends with (config)# after the device name, such as Switch(config)#.

A

Global configuration mode

39
Q

____is accessed before other specific configuration modes.

A

Global configuration mode

40
Q

T or F | From global config mode, can the user enter in different sub configuration modes?

41
Q

Userd to configure console, SSH, Telnet, or AUX access

A

Line Configuration Mode

42
Q

Used to configure a switch port or router network interface

A

Interface Configuration Mode

43
Q

T or F | By default does every prompt begins with the device name?

44
Q

To move from user EXEC mode to privileged EXEC mode, use the ____ command.

45
Q

Use the ____ privileged EXEC mode command to return to user EXEC mode.

46
Q

Privileged EXEC mode is sometimes called ___-

A

enable mode.

47
Q

To move in and out of global configuration mode, use the ____ privileged EXEC mode command.

A

configure terminal

48
Q

To return to the privileged EXEC mode, enter the ___ global config mode command.

49
Q

To move from any subconfiguration mode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the ___ command.

50
Q

To move from any subconfiguration mode to the privileged EXEC mode, enter the end command or enter the key combination ____

51
Q

Which IOS mode allows access to all commands and features?

A

Privileged EXEC Mode

52
Q

Which IOS mode are you in if the Switch(config)# prompt is displayed?

A

Global configuration mode

53
Q

Which Ios mode are you in if the Switch> prompt is displayed

A

User EXEC Mode

54
Q

A ____ must know the basic IOS command structure to be able to use the CLI for device configuration.

A

network administrator

55
Q

T or F | Does each IOS command has a specific format, or syntax, and can only be executed in the appropriate mode?

56
Q

This is a specific parameter defined in the operating system (in the figure, ip protocols).

57
Q

This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5).

58
Q

After entering each complete command, including any keywords and arguments, press the ___ key to submit the command to the command interpreter.

59
Q

T or F | Does a command might require one or more arguments?

60
Q

To determine the keywords and arguments required for a command, refer to the ___

A

command syntax.

61
Q

Indicates command and keywords that you enter literally as shown

62
Q

Indicates arguments for which you supply values

63
Q

Indicate and optional element (keyword or argument)

A

Square brackets

64
Q

Indicate a required element (keyword or argument)

65
Q

indicate a required choice within an optional element. Spaces are used to clearly delineate parts of the command

A

Braces and vertical lines within square brackets

66
Q

the syntax for using the description command is ___

A

description string.

67
Q

The argument is a ___ value provided by the user.

68
Q

The ___ command is typically used to identify the purpose of an interface.

A

description

69
Q

The command is ___ and the user-defined argument is the____ of the destination device. For example, ping 10.10.10.5.

A

ping, ip-address

70
Q

The command is ___ and the user-defined argument is the ip-address of the destination device. For example, traceroute 192.168.254.254

A

traceroute

71
Q

The IOS has two forms of help available:

A

context-sensitive help and command syntax check.