NETACAD MODULE 2 Flashcards

1
Q

Describe the different parts of an Operating System?

A

Shell- The user interface that allows the user to request specific tasks from the computer. Can either be CLI or GUI
Kernel- Communicates with the hardware and software of a computer and manages how hardware resources are used to meet software requirements
Hardware- The physical part of a computer including underlying electronics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are the different access methods that can be configured on a switch

A

Console
Secure Shell(SSH)
Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe Console access method

A

This is a physical management port that provides out-of-band access to a Cisco device. Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only. The advantage of using a console port is that the device is accessible even if no networking services are configured, such as performing the initial configuration. A computer running terminal emulation software and a special console cable to connect to the device are required for a console connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe Secure Shell access method

A

SSH is an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network. Unlike a console connection, SSH connections require active networking services on the device, including an active interface configured with an address. Most versions of Cisco IOS include an SSH server and an SSH client that can be used to establish SSH sessions with other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Describe Telnet access method

A

Telnet is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network. Unlike SSH, Telnet does not provide a secure, encrypted connection and should only be used in a lab environment. User authentication, passwords, and commands are sent over the network in plaintext. The best practice is to use SSH instead of Telnet. Cisco IOS includes both a Telnet server and Telnet client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are terminal emulation Programs and give examples

A

These programs allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes. There are several terminal emulation programs you can use to connect to a networking device either by a serial connection over a console port, or by an SSH/Telnet connection.

PuTTY, Tera Term, SecureCRT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which access method would be the most appropriate in-band access to the IOS over a network connection?

A

Telnet/SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection?

A

Aux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Describe the two different command modes on a CLI

A

1.User Exec Mode
-Mode allows access to only a limited number of basic monitoring commands.
-It is often referred to as “view-only” mode.
Switch>
Router>
2.Privileged EXEC Mode
-Mode allows access to all commands and features.
-The user can use any monitoring commands and execute configuration and management commands.
Switch#
Router#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the functionalities of the global configuration modes?

A

From global config mode, CLI configuration changes are made that affect the operation of the device as a whole. Global configuration mode is identified by a prompt that ends with (config)# after the device name, such as Switch(config)#.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the two common sub-configuration modes?

A

Line Configuration Mode - Used to configure console, SSH, Telnet, or AUX access.
Interface Configuration Mode - Used to configure a switch port or router network interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are the two system files that store the device configuration and the commands pertaining to them?

A
  1. startup-config - This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.
  2. running-config - This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.

show running-config- used to view the running config.
show startup-config- used to view the startup config
copy running-config startup-config- used to save changes made to the running configuration to the startup configuration file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is an IPv4 subnet mask?

A

a 32-bit value that differentiates the network portion of the address from the host portion. Coupled with the IPv4 address, the subnet mask determines to which subnet the device is a member.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

How is an IPv4 address represented?

A

four decimal numbers between 0 and 255 separated by periods

17
Q

What is the purpose of SVI?

A

To access the switch remotely, an IP address and a subnet mask must be configured on the Switch Virtual Interface Configuration