NETACAD MODULE 2 Flashcards
Describe the different parts of an Operating System?
Shell- The user interface that allows the user to request specific tasks from the computer. Can either be CLI or GUI
Kernel- Communicates with the hardware and software of a computer and manages how hardware resources are used to meet software requirements
Hardware- The physical part of a computer including underlying electronics
What are the different access methods that can be configured on a switch
Console
Secure Shell(SSH)
Telnet
Describe Console access method
This is a physical management port that provides out-of-band access to a Cisco device. Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only. The advantage of using a console port is that the device is accessible even if no networking services are configured, such as performing the initial configuration. A computer running terminal emulation software and a special console cable to connect to the device are required for a console connection.
Describe Secure Shell access method
SSH is an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network. Unlike a console connection, SSH connections require active networking services on the device, including an active interface configured with an address. Most versions of Cisco IOS include an SSH server and an SSH client that can be used to establish SSH sessions with other devices.
Describe Telnet access method
Telnet is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network. Unlike SSH, Telnet does not provide a secure, encrypted connection and should only be used in a lab environment. User authentication, passwords, and commands are sent over the network in plaintext. The best practice is to use SSH instead of Telnet. Cisco IOS includes both a Telnet server and Telnet client.
What are terminal emulation Programs and give examples
These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes. There are several terminal emulation programs you can use to connect to a networking device either by a serial connection over a console port, or by an SSH/Telnet connection.
PuTTY, Tera Term, SecureCRT
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured?
Console
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?
Console
Which access method would be the most appropriate in-band access to the IOS over a network connection?
Telnet/SSH
Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection?
Aux
Describe the two different command modes on a CLI
1.User Exec Mode
-Mode allows access to only a limited number of basic monitoring commands.
-It is often referred to as “view-only” mode.
Switch>
Router>
2.Privileged EXEC Mode
-Mode allows access to all commands and features.
-The user can use any monitoring commands and execute configuration and management commands.
Switch#
Router#
What are the functionalities of the global configuration modes?
From global config mode, CLI configuration changes are made that affect the operation of the device as a whole. Global configuration mode is identified by a prompt that ends with (config)# after the device name, such as Switch(config)#.
What are the two common sub-configuration modes?
Line Configuration Mode - Used to configure console, SSH, Telnet, or AUX access.
Interface Configuration Mode - Used to configure a switch port or router network interface.
What are the two system files that store the device configuration and the commands pertaining to them?
- startup-config - This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.
- running-config - This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
show running-config- used to view the running config.
show startup-config- used to view the startup config
copy running-config startup-config- used to save changes made to the running configuration to the startup configuration file
What is an IPv4 subnet mask?
a 32-bit value that differentiates the network portion of the address from the host portion. Coupled with the IPv4 address, the subnet mask determines to which subnet the device is a member.