02_Basic Switch and End Device Configuration Flashcards

1
Q

Operating Systems

A

he portion of the OS that interacts directly with computer hardware is known as the kernel. The portion that interfaces with applications and the user is known as the shell. The user can interact with the shell using a command-line interface (CLI) or a graphical user interface (GUI).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

shell

A

the user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

kernel

A

communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

hardware

A

physical part of a computer including underlying electronics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

GUI

A

A GUI such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows. The GUI example in the figure is more user-friendly and requires less knowledge of the underlying command structure that controls the system. For this reason, most users rely on GUI environments.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Purpose of an OS

A

Network operating systems are similar to a PC operating system. Through a GUI, a PC operating system enables a user to do the following:

  • Use a mouse to make selections and run programs
  • Enter text and text-based commands
  • View output on a monitor

A CLI-based network operating system (e.g., the Cisco IOS on a switch or router) enables a network technician to do the following:

  • Use a keyboard to run CLI-based network programs
  • Use a keyboard to enter text and text-based commands
  • View output on a monitor
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Console

A

This is a physical management port that provides out-of-band access to a Cisco device. Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only. The advantage of using a console port is that the device is accessible even if no networking services are configured, such as performing the initial configuration. A computer running terminal emulation software and a special console cable to connect to the device are required for a console connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Secure Shell (SSH)

A

SSH is an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network. Unlike a console connection, SSH connections require active networking services on the device, including an active interface configured with an address. Most versions of Cisco IOS include an SSH server and an SSH client that can be used to establish SSH sessions with other devices.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Telnet

A

Telnet is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network. Unlike SSH, Telnet does not provide a secure, encrypted connection and should only be used in a lab environment. User authentication, passwords, and commands are sent over the network in plaintext. The best practice is to use SSH instead of Telnet. Cisco IOS includes both a Telnet server and Telnet client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which access method would be the most appropriate in-band access to the IOS over a network connection?

A

Telnet/SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection?

A

Aux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

User EXEC Mode

A
  • Mode allows access to only a limited number of basic monitoring commands.
  • It is often referred to as “view-only” mode.

Switch>
Router>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Privileged EXEC Mode

A
  • Mode allows access to all commands and features.
  • The user can use any monitoring commands and execute configuration and management commands.

Switch#
Router#

Various commands are used to move in and out of command prompts. To move from user EXEC mode to privileged EXEC mode, use the enable command. Use the disable privileged EXEC mode command to return to user EXEC mode.

Note: Privileged EXEC mode is sometimes called enable mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

global config mode

A

To configure the device, the user must enter global configuration mode, which is commonly called global config mode.

From global config mode, CLI configuration changes are made that affect the operation of the device as a whole. Global configuration mode is identified by a prompt that ends with (config)# after the device name, such as Switch(config)#.

Global configuration mode is accessed before other specific configuration modes. From global config mode, the user can enter different subconfiguration modes.

configure terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Line Configuration Mode

A

Used to configure console, SSH, Telnet, or AUX access.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Interface Configuration Mode

A

Used to configure a switch port or router network interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

To move from any subconfiguration mode of the global configuration mode to the mode one step above it in the hierarchy of modes…

A

…enter the exit command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

To move from any subconfiguration mode to the privileged EXEC mode…

A

…enter the end command or enter the key combination Ctrl+Z.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

enable command

A

Privileged EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

line console 0

A
  • subconfiguration mode

- management interface for the console port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

line vty 0 15

A

virtual terminal management

remote access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

end command

A

exit out all of subconfiguration modes and return to privileged exec mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Which IOS mode allows access to all commands and features?

A

privileged EXEC mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which IOS mode are you in if the Switch(config)# prompt is displayed?

A

global configuration mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which IOS mode are you in if the Switch> prompt is displayed?

A

user EXEC mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in? (Choose two.)

A
  • CTRL+Z

- end

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Keyword

A

This is a specific parameter defined in the operating system (in the figure, ip protocols).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Argument

A

This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

boldface

A

Boldface text indicates commands and keywords that you enter literally as shown.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

italics

A

Italic text indicates arguments for which you supply values.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

[x]

A

Square brackets indicate an optional element (keyword or argument).

34
Q

{x}

A

Braces indicate a required element (keyword or argument).

35
Q

[x {y | z }]

A

Braces and vertical lines within square brackets indicate a required choice within an optional element. Spaces are used to clearly delineate parts of the command.

36
Q

table lists keystrokes to enhance command line editing

A

Keystroke Description
Tab Completes a partial command name entry.

Backspace Erases the character to the left of the cursor.

Ctrl+D Erases the character at the cursor.

Ctrl+K Erases all characters from the cursor to the end of the command line.

Esc D Erases all characters from the cursor to the end of the word.

Ctrl+U or Ctrl+X Erases all characters from the cursor back to the beginning of the command line.

Ctrl+W Erases the word to the left of the cursor.

Ctrl+A Moves the cursor to the beginning of the line.

Left Arrow or Ctrl+B Moves the cursor one character to the left.

Esc B Moves the cursor back one word to the left.

Esc F Moves the cursor forward one word to the right.

Right Arrow or Ctrl+F Moves the cursor one character to the right.

Ctrl+E Moves the cursor to the end of command line.

Up Arrow or Ctrl+P Recalls the previous command in the history buffer, beginning with the most recent command.

Down Arrow or Ctrl+N Goes to the next line in the the history buffer.

Ctrl+R or Ctrl+I or Ctrl+L Redisplays the system prompt and command line after a console message is received.

Enter Key Displays the next line.

Space Bar Displays the next screen.

Any other key * Ends the display string, returning to previous prompt.
* Except “y”, which answers “yes” to the –More– prompt, and acts like the Space bar

Ctrl-C When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode. When in setup mode, aborts back to the command prompt.

Ctrl-Z When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode.

Ctrl-Shift-6 All-purpose break sequence used to abort DNS lookups, traceroutes, pings, etc.

37
Q

key points to consider when choosing passwords:

A
  • Use passwords that are more than eight characters in length.
  • Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences.
  • Avoid using the same password for all devices.
  • Do not use common words because they are easily guessed.
38
Q

Configure Passwords

A

To secure user EXEC mode access, enter line console configuration mode using the line console 0 global configuration command, as shown in the example. The zero is used to represent the first (and in most cases the only) console interface. Next, specify the user EXEC mode password using the password password command. Finally, enable user EXEC access using the login command.

To have administrator access to all IOS commands including configuring a device, you must gain privileged EXEC mode access. It is the most important access method because it provides complete access to the device.

To secure privileged EXEC access, use the enable secret password global config command, as shown in the example.

To secure VTY lines, enter line VTY mode using the line vty 0 15 global config command. Next, specify the VTY password using the password password command. Lastly, enable VTY access using the login command.

An example of securing the VTY lines on a switch is shown.

39
Q

Encrypt Passwords

A

To encrypt all plaintext passwords, use the service password-encryption global config command as shown in the example.

The command applies weak encryption to all unencrypted passwords. This encryption applies only to passwords in the configuration file, not to passwords as they are sent over the network. The purpose of this command is to keep unauthorized individuals from viewing passwords in the configuration file.

Use the show running-config command to verify that passwords are now encrypted.

40
Q

Banner Messages

A

To create a banner message of the day on a network device, use the banner motd # the message of the day # global config command. The “#” in the command syntax is called the delimiting character. It is entered before and after the message. The delimiting character can be any character as long as it does not occur in the message. For this reason, symbols such as the “#” are often used. After the command is executed, the banner will be displayed on all subsequent attempts to access the device until the banner is removed.

41
Q

What is the command to assign the name “Sw-Floor-2” to a switch?

A

hostname _____

42
Q

How is the privileged EXEC mode access secured on a switch?

A

enable secret class

43
Q

Which command enables password authentication for user EXEC mode access on a switch?

A

login

44
Q

Which command encrypts all plaintext passwords access on a switch?

A

service password-encryption

45
Q

Which is the command to configure a banner to be displayed when connecting to a switch?

A

banner motd $ Keep out $

46
Q

two system files that store the device configuration:

A
  • startup-config - This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.
  • running-config - This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
47
Q

reload

A

If changes made to the running config do not have the desired effect and the running-config has not yet been saved, you can restore the device to its previous configuration. Remove the changed commands individually, or reload the device using the reload privileged EXEC mode command to restore the startup-config.

The downside to using the reload command to remove an unsaved running config is the brief amount of time the device will be offline, causing network downtime.

48
Q

erase startup-config

A

if undesired changes were saved to the startup config, it may be necessary to clear all the configurations. This requires erasing the startup config and restarting the device. The startup config is removed by using the erase startup-config privileged EXEC mode command. After the command is issued, the switch will prompt you for confirmation. Press Enter to accept.

49
Q

startup-config

A

This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.

50
Q

running-config

A

This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.

51
Q

show running-config

A

privileged EXEC mode command is used to view the running config.

52
Q

copy running-config startup-config

A

To save changes made to the running configuration to the startup configuration file, use the copy running-config startup-config privileged EXEC mode command.

53
Q

Capture Configuration to a Text File

A

Step 1. Open terminal emulation software, such as PuTTY or Tera Term, that is already connected to a switch.

Step 2. Enable logging in the terminal software and assign a name and file location to save the log file. The figure displays that All session output will be captured to the file specified (i.e., MySwitchLogs).

Step 3. Execute the show running-config or show startup-config command at the privileged EXEC prompt. Text displayed in the terminal window will be placed into the chosen file.

Step 4. Disable logging in the terminal software. The figure shows how to disable logging by choosing the None session logging option.

54
Q

To restore a configuration file to a device:

A

Step 1. Enter global configuration mode on the device.

Step 2. Copy and paste the text file into the terminal window connected to the switch.

55
Q

IP

A

IP in this course refers to both the IPv4 and IPv6 protocols. IPv6 is the most recent version of IP and is replacing the more common IPv4.

The structure of an IPv4 address is called dotted decimal notation and is represented by four decimal numbers between 0 and 255. IPv4 addresses are assigned to individual devices connected to a network.

56
Q

Examples of end devices

A
  • Computers (work stations, laptops, file servers, web servers)
  • Network printers
  • VoIP phones
  • Security cameras
  • Smart phones
  • Mobile handheld devices (such as wireless barcode scanners)
57
Q

Types of network media

A

twisted-pair copper cables, fiber-optic cables, coaxial cables, or wireless

58
Q

What is the structure of an IPv4 address called?

A

dotted-decimal format

59
Q

How is an IPv4 address represented?

A

four decimal numbers between 0 and 255 separated by periods

60
Q

What type of interface has no physical port associated with it?

A

switch virtual interface (SVI)

61
Q

To manually configure an IPv4 address on a Windows host

A

open the Control Panel > Network Sharing Center > Change adapter settings and choose the adapter. Next right-click and select Properties to display the Local Area Connection Properties

62
Q

DHCP

A

End devices typically default to using DHCP for automatic IPv4 address configuration. DHCP is a technology that is used in almost every network. The best way to understand why DHCP is so popular is by considering all the extra work that would have to take place without it.

In a network, DHCP enables automatic IPv4 address configuration for every end device that is DHCP-enabled. Imagine the amount of time it would take if every time you connected to the network, you had to manually enter the IPv4 address, the subnet mask, the default gateway, and the DNS server. Multiply that by every user and every device in an organization and you see the problem. Manual configuration also increases the chance of misconfiguration by duplicating another device’s IPv4 address.

63
Q

to configure DHCP on a Windows PC

A

you only need to select Obtain an IP address automatically and Obtain DNS server address automatically

64
Q

ipconfig

A

display the IP configuration settings on a Windows PC by using the ipconfig command at the command prompt. The output will show the IPv4 address, subnet mask, and gateway information received from the DHCP server.

65
Q

interface vlan 1

A

o configure an SVI on a switch, use the interface vlan 1 global configuration command. Vlan 1 is not an actual physical interface but a virtual one. Next assign an IPv4 address using the ip address ip-address subnet-mask interface configuration command. Finally, enable the virtual interface using the no shutdown interface configuration command.

66
Q

ip default-gateway ip-address

A

Similar to a Windows hosts, switches configured with an IPv4 address will typically also need to have a default gateway assigned. This can be done using the ip default-gateway ip-address global configuration command. The ip-address parameter would be the IPv4 address of the local router on the network, as shown in the example. However, in this module you will only be configuring a network with switches and hosts. Routers will be introduced later.

67
Q

ping

A
  • When the IP addressing configuration is complete, you will use various show commands to verify configurations and use the ping command to verify basic connectivity between devices.
  • ping command can be used to test connectivity to another device on the network or a website on the internet
68
Q

show ip interface brief

A

command is useful for verifying the condition of the switch interfaces

69
Q

Which statement is true about the running configuration file in a Cisco IOS device?

A

It affects the operation of the device immediately when modified

70
Q

Which two statements are true regarding the user EXEC mode?

A
  • only some aspects of the router configuration can be viewed
  • deice prompt for this mode ends with the “>” symbol
71
Q

Which type of access is secured on a Cisco router or switch with the enable secret command?

A

privileged EXEC

72
Q

What is the default SVI on a Cisco switch?

A

VLAN1

73
Q

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines?

A
  • hostname should begin with a letter
  • hostname should be fewer than 64 characters later
  • hostname should contain no spaces
74
Q

What is the function of the shell in an OS?

A

It interfaces between the users and the kernel

75
Q

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

A

user EXEC mode

76
Q

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

A

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed

77
Q

Which memory location on a Cisco router or switch will lose all content when the device is restarted?

A

RAM

78
Q

Why would a technician enter the command copy startup-config running-config?

A

to copy an existing configuration into RAM

79
Q

Which functionality is provided by DHCP?

A

automatic assignment of an IP address to each host

80
Q

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?

A
  • determining which option, keyword, or argument is available for the entered command
  • displaying a list of all available commands within the current mode
81
Q

Which memory location on a Cisco router or switch stores the startup configuration file?

A

NVRAM

82
Q

To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?

A

10.1.0.0