Module 2 (PPT) Flashcards

1
Q

The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.

A

Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.

A

Kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The physical part of a computer including underlying electronics

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ___ allows the user to interact with the system using an environment of graphical icons, menus, and windows.

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A ___is more user-friendly and requires less knowledge of the underlying command structure that controls the system.

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

GUIs can fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a ____.

A

CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

PC operating system enables a user to do the following:

A
  • Use a mouse to make selections and run programs
  • Enter text and text-based commands
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

CLI-based network operating system enables a network technician to do the following:

A
  • Use a keyboard to run CLI-based network programs
  • Use a keyboard to enter text and text-based commands
  • View output on a monitor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A physical management port used to access a device in order to provide maintenance, such as performing the initial configurations.

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.)

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords and commands are sent over the network in plaintext.)

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

____ programs are used to connect to a network device by either a console port or by an SSH/Telnet connection.

A

Terminal emulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
  • Allows access to only a limited number of basic monitoring commands
  • Identified by the CLI prompt that ends with the > symbol
A

User EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • Allows access to all commands and features
  • Identified by the CLI prompt that ends with the # symbol
A

Privileged EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Used to access configuration options on the device

A

Global Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Used to configure console, SSH, telnet or AUX access

A

Line Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Used to configure a switch port or router interface

A

Interface Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

To mode from user EXEC mode to privilege EXEC mode, use the ____ command

A

enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

To move in and out of global configuration mode, use the ____ command.

A

configure terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To return to privileged EXEC mode, use the ___ command

A

exit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

To move in and out of line configuration mode, use the ___ command followed by the management line type

A

line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

To return to global configuration mode, use the __- command

A

exit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

To move out of any sub configuration mode to get back to global configuration mode, use the ___ command

A

exit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

To return to privilege EXEC mode, use the ___ command or key combination _____

A

end | CTRL + Z

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

To move directly from one subconfiguration mode to another, ____in the desired subconfiguration mode command.

A

type

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

This is a specific parameter defined in the operating system (in the figure,ip protocols).

A

Keyword

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

This is not predefined; it is a value or variable defined by the user (in the figure,192.168.10.5).

A

Argument

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A ___ might require one or more arguments. To determine the keywords and arguments required for a command, refer to the command syntax.

A

command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

___ text indicates commands and keywords that are entered as shown.

A

boldface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

text indicates arguments for which you supply values

A

italic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

____ indicate an optional element

A

Square brackets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

indicate a required element

A

Braces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

___ and ___ within square brackets indicate a required choice within an optional element. Spaces are used to clearly delineate parts of the command.

A

Braces and vertical lines

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The command is____and the user-defined argument is theip-addressof the destination device. For example,___ 10.10.10.5.

A

ping

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The command is____and the user-defined argument is theip-addressof the destination device. For example,____192.168.254.254

A

traceroute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

____ help enables you to quickly find answers to these questions:
- Which commands are available in each command mode?

  • Which commands start with specific characters or group of characters?
  • Which arguments and keywords are available to particular commands?
A

Context-sensitive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

___ check verifies that a valid command was entered by the user.

  • If the interpreter cannot understand the command being entered, it will provide feedback describing what is wrong with the command.
A

Command syntax

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

The ____ provides hot keys and shortcuts that make configuring, monitoring, and troubleshooting easier.

A

IOS CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Completes a partial command name entry

A

Tab

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Erases the character to the left of the cursor

A

Backspace

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Moves the cursor one character to the left

A

Left Arrow or CTRL B

42
Q

Moves the cursor one character to the right

A

Right Arrow or CTRL F

43
Q

Recalls the command in the history buffer, beginning with the most recent commands.

A

Up Arrow or CTRL P

44
Q

Displays the next line

45
Q

Displays the next screen

46
Q

Ends the display string, returning to privileged EXEC mode

A

Any other key

47
Q

When in any configuration mode, ends the configuration mode and returns to privilefed EXEC mode

48
Q

When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode

49
Q

All-purpose break sequence used to abort DNS lookups, traceroutes, pings

A

CTRL + SHIFT + 6

50
Q

The first configuration command on any device should be to give it a ____

A

unique hostname.

51
Q

By ____ , all devices are assigned a factory default name. For example, a Cisco IOS switch is “Switch.”

52
Q

To return the switch to the default prompt, use the____ command.

A

no hostnameglobal config

53
Q

The use of weak or easily guessed passwords are a ____ concern.

54
Q

All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and remote Telnet access with passwords. In addition, all passwords should be ___ and legal notifications provided.

55
Q

Password Guidelines:

A
  • Use passwords that are more than eight characters in length.
  • Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences.
  • Avoid using the same password for all devices.
  • Do not use common words because they are easily guessed.
56
Q

Most of the labs in this course use simple passwords such as____. These passwords are considered weak and easily guessable and should be avoided in production environments.

A

ciscoorclass

57
Q

First enter line console configuration mode using the___ commandin global configuration mode.

A

line console 0

58
Q

Next, specify the user EXEC mode password using the___ passwordcommand.

59
Q

Finally, enable user EXEC access using the____ command.

60
Q

To secure privileged EXEC mode access:

A
  • First enter global configuration mode.
  • Next, use theenable secretpasswordcommand.
61
Q

Securing VTY line access:

  • First enter line VTY configuration mode using the____ commandin global configuration mode.
A

line vty 0 15

62
Q

Next, specify the VTY password using the___ passwordcommand.

63
Q

Finally, enable VTY access using the___ command.

64
Q

VTY lines enable remote access using ____ to the device. Many Cisco switches support up to 16 VTY lines that are numbered 0 to 15.

A

Telnet or SSH

65
Q

To encrypt all plaintext passwords, use the____global config command.

A

service password-encryption

66
Q

Use the ____ command to verify that the passwords on the device are now encrypted.

A

show running-config

67
Q

A ____ is important to warn unauthorized personnel from attempting to access the device.

A

banner message

68
Q

To create a banner message of the day on a network device, use the____ command.

A

banner motd #the message of the day#global config

69
Q

The “#” in the command syntax is called the ___. It is entered before and after the message.

A

delimiting character

70
Q

This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.

A

Startup-config

71
Q

This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately

A

Running-config

72
Q

____ is volatile memory. It loses all of its content when the device is powered off or restarted

73
Q

To savce changes made to the running configuration to the startup configuration file, use the copy ____privileged EXEC mode command

A

running-config startup-config

74
Q

Reload the device using the ____command in privilege EXEC mode. Note: This will cause the device to briefly go offline, leading to network downtime.

75
Q

If the undesired changes were saved to the startup-config, it may be necessary to clear all the configurations using the ____command in privilege EXEC mode.

A

erase startup-config

76
Q

Configuration files can also be saved and archived to a text document. What are the steps?

A

Step 1.Open terminal emulation software, such as PuTTY or Tera Term, that is already connected to a switch.

Step 2.Enable logging in to the terminal software and assign a name and file location to save the log file. The figure displays thatAll session outputwill be captured to the file specified (i.e., MySwitchLogs).

Step 3.Execute theshow running-configorshow startup-configcommand at the privileged EXEC prompt. Text displayed in the terminal window will be placed into the chosen file.

Step 4.Disable logging in the terminal software. The figure shows how to disable logging by choosing theNonesession logging option

77
Q

Note: The text file created can be used as a record of how the device is currently implemented. The file could require editing before being used to restore a saved configuration to a device.

78
Q

The use of __ is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet.

A

IP addresses

79
Q

The structure of an IPv4 address is called___- and is represented by four decimal numbers between 0 and 255.

A

dotted decimal notation

80
Q

An IPv4 subnet mask is a ___ that differentiates the network portion of the address from the host portion. Coupled with the IPv4 address, the subnet mask determines to which subnet the device is a member.

A

32-bit value

81
Q

The default gateway address is the___ of the router that the host will use to access remote networks, including the internet.

A

IP address

82
Q

IPv6 addresses are ___ in length and written as a string of hexadecimal values. Every four bits is represented by a single hexadecimal digit; for a total of 32 hexadecimal values. Groups of four hexadecimal digits are separated by a colon “:”.

83
Q

IPv6 addresses are ___ and can be written in either lowercase or uppercase.

A

not case-sensitive

84
Q

IP in this course refers to both the ___-. IPv6 is the most recent version of IP and is replacing the more common IPv4.

A

IPv4 and IPv6 protocols.

85
Q

What is the most recent version of IP

86
Q

___ depend on end user device interfaces, networking device interfaces, and the cables that connect them.

A

Network communications

87
Q

Types of network media

A

twisted-pair copper cables, fiber-optic cables, coaxial cables, or wireless.

88
Q

Different types of network media have different features and benefits. Some of the differences between various types of media include:

A
  • Distance the media can successfully carry a signal
  • Environment in which the media is to be installed
  • Amount of data and the speed at which it must be transmitted
  • Cost of the media and installation
89
Q

____ on the network need an IP address in order to communicate with other devices on the network.

A

End devices

90
Q

___information can be entered into end devices manually, or automatically using Dynamic Host Configuration Protocol (DHCP).

A

IPv4 address

91
Q

Enter the____ command inglobal configuration mode.

  • Next assign an IPv4 address using the____ip-address subnet-mask command.
  • Finally, enable the virtual interface using the___ command.
A

interface vlan 1

ip address

no shutdown

92
Q

T or F | Does all end devices and network devices require an operating system

93
Q

What are the two command modes in Cisco IOS software?

A

User Exec Mode
Privileged EXEC mode

94
Q

____ is accessed before other specific configuration modes

A

Global configuration mode

95
Q

T or F | From global config mode, the user can’t enter different sub configuration modse

A

False, it can enter different sub configuraiton mode

96
Q

T or F | Does each IOS command doesn’t have a specific format or syntax and can only be executed in the appropriate mode?

A

False, each IOS command has a specific format

97
Q

What are the basic device configurations

A
  • Hostname
  • Password
  • Encrypt Passwords
  • Banner
98
Q

What are the two ssytem files tha store the device configuration

A

Startup config
Running config

99
Q

____ enable devices to locate one another and establish end-to-end communication on the internet.

A

IP addresses

100
Q

Each end device on a network must be configured with an ____

A

IP Addresses