Chapter 2 Flashcards
(8 cards)
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
- Issue the reload command without saving the running configuration
3.
Why is it important to configure a hostname on a device?
- to identify the device during remote access (SSH or telnet)
Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?
Use the console port to locally access the switch from a serial or USB interface of the PC.
What criterion must be followed in the design of an IPv4 addressing scheme for end devices?
- Each IP address must be unique within the local network.
A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
SSH
Which interface allows remote management of a Layer 2 switch?
the switch virtual interface
What is a result of using the service password-encryption command on a Cisco network device?
All passwords in the configuration are not shown in clear text when viewing the configuration.
- Completes the remainder of a partially typed command or keyword
–Redisplays, on a new line, the command currently being typed
– Exits configuration mode and returns to the EXEC
– Up Arrow – Allows user to scroll backward through former commands
– Ctrl-C – cancels any command currently being entered and returns directly to privileged EXEC mode
– Ctrl-Shift-6 – Allows the user to interrupt an IOS process such as ping or traceroute.
Tab
Ctrl R
Ctrl-Z