Topic 2 Flashcards

1
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three ways a user can access the Cisco IOS?

A

Console, Secure shell, Telnet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Describe briefly the User EXEC Mode.

A

Allows access to only limited number of basic monitoring commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Describe briefly the Privileged EXEC Mode.

A

Allows access to all commands and features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is Line Configuration Mode used for?

A

Used to configure console, SSH, Telnet or AUX access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is Interface Configuration Mode used for?

A

Used to configure a switch port or router interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What command moves from User EXEC mode to Privileged EXEC mode?

A

enable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What command moves from Privileged EXEC mode to User EXEC mode?

A

disable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What command is used to enter global configuration mode?

A

configure terminal.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What command is used to exit global configuration mode?

A

end.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What command is used to exit line configuration mode?

A

exit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does Context Sensitive help provide?

A

Enables us to quickly find answers to the questions.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What does the Space HOT key do?

A

Displays the next screen.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What does the Enter HOT key do?

A

Displays the next line.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What does the Tab HOT key do?

A

Completes a partial command name entry.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What does the Up HOT key do?

A

Recalls the commands in the history buffer.

17
Q

What does the Ctrl-Shift-6 HOT key do?

A

All purpose break sequence used to abort DNS lookups, traceroutes, ping, etc.

18
Q

What does the ? HOT key do?

A

Ends the display string, returning to privileged EXEC mode.

19
Q

List the three device accesses that should be secured with passwords.

A
  • User EXEC Mode
  • Privileged EXEC Mode
  • VTY line access.
20
Q

What does the command service password-encryption do?

A

Encrypts all plaintext passwords.

21
Q

What is the purpose of the show running-config command?

A

Used to verify that the passwords on the device are encrypted.

22
Q

What is Startup-Config?

A

This is the saved configuration file that is stored in NVRAM.

23
Q

What is Running-Config?

A

This is stored in RAM and reflects the current configuration.

24
Q

What command is used to save the running configuration file onto NVRAM?

A

copy running-config startup-config.

25
Q

What does the reload command do?

A

It causes the device to briefly go offline, leading to network downtime.

26
Q

What is the purpose of IP addresses?

A

Enables devices to locate one another and establish end-to-end communication on the internet.

27
Q

What is the structure of IP called?

A

Dotted decimal.

28
Q

How is the structure of IP represented?

A

By 4 decimal numbers between 0 and 255.

29
Q

Define the IPv4 mask.

A

A 32-bit that differentiates the network portion of the address from the host portion.

30
Q

What is the purpose of the subnet mask?

A

Determines to which subnet the device is a member.

31
Q

Define the default gateway address.

A

The IP address of the router that the host will use to access remote networks.

32
Q

What is the purpose of DHCP?

A

Enables automatic IPV4 addresses configuration for every end device that is DHCP-enabled.

33
Q

What is the purpose of configuring an IP Address and a subnet mask on SVI (VLAN on a Switch)?

A

To access the switch remotely.

34
Q

What command is used to verify the end-to-end connectivity?