Cisco Networking Fundamentals Flashcards Preview

Spring 2014 > Cisco Networking Fundamentals > Flashcards

Flashcards in Cisco Networking Fundamentals Deck (95)
Loading flashcards...
30

VTY password

Limits device access over Telnet. Must be in line configuration mode for that line to configure its password.

31

line console 0

Enters line configuration mode. Must be in global configuration mode first. The zero is the first (and usually only) console interface.

32

login

Use after setting a password so that it will ask for that password at login of that mode.

33

service-password-encryption

Prevents passwords from showing up as plaintext text when viewing the configuration files. Applies only to passwords in the configuration file, not as they are sent over the media.

34

banner motd

Message of the day banner. Follow this command with a space, a delimiting character, the message, another space, and then the delimiting character again.

35

copy running-config startup-config

Saves the running configuration file updates to the startup configuration file.

36

reload

(In privileged exec)

Restarts the device

37

Commands that will return the device to the default factory state:

erase startup-config

delete vlan.dat

(Must be in privileged exec)

Then reload the device and it will load the default startup configuration.

38

SVI

Switch virtual interface. Provides a means to remotely manage a switch over a network using IPv4. Each switch comes with one SVI in the default configuration: interface VLAN1.

39

interface vlan 1

Enters the interface configuration mode from the global configuration mode.

ip address whateveripaddressandsubnetmask sets the IP address and subnet mask. Must then run no shutdown to activate the interface.

40

show ip interface brief

Is like ipconfig for switches and routers. Verifies the interfaces of intermediary devices, showing IP addresses, state of each interface, etc.

41

CLI hot key: Ctrl-Shift-6

Allows the user to interrupt an IOS process such as ping or tracert.

42

Out-of-band access

Access via a dedicated management channel that is used for device maintenance purposes only.

43

Console port access

Using a console cable to plug directly in. Out-of-band access. By default, conveys the startup, debugging, and error messages.

44

Context-sensitive help

Provides a list of commands and the arguments associated with those commands within he context of the current mode. So, shows the commands available, and also shows which options, keywords, or arguments are matched with a specific command.

45

Encapsulation

The process of placing one message format inside another message format (like a letter in an envelope).

46

Segmenting

Breaking the message up into individual pieces that meet both the maximum and minimum requirements. Each segment is encapsulated in a separate frame.

47

Access method

Determines when someone is able to send a message. Let's the computer know when to send a message and what to do about errors.

48

Flow control

Negotiates the timing for successful communication. The sending host can transmit faster than the destination can receive and process.

49

Response timeout

Rules that specify how long to wait for responses and what action to take if a response timeout occurs.

50

Unicast

One-to-one delivery option; a single destination for the message.

51

Multicast

One-to-many delivery option. The delivery of the same message to a group of host destinations simultaneously.

52

Broadcast

One-to-all delivery option. For when all the hosts on a network need to receive the message at the same time.

53

Protocol suite

A group of inter-related protocols necessary to perform a communication function.

54

Protocol stack

Shows how the individual protocols within a suite are implemented. The lower layers are conceded with moving data over the network and providing services to the upper layers, which are focused in the content of the message being sent.

56

HTTP

Hypertext Transfer Protocol. Governs the way a web server and a web client interact. HTTP defines the content and formatting of the requests and responses that are exchanged between the client and server. Both the client and the web server software implement HTTP as part of the application. HTTP relies on other protocols to govern how the messages are transported between the client and server.

Set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web

A TCP/IP Application Layer protocol.

57

TCP

Transmission Control Protocol. Manages the individual conversations between web servers and web clients. TCP divides the HTTP messages into smaller pieces, called segments. These segments are sent between the web server and client processes running at the destination host. TCP is also responsible for controlling the size and rate at which messages are exchanged between the server and the client.

Enables reliable communication between processes running on separate hosts. Reliable, acknowledged transmissions that confirm successful delivery (as opposed to UDP).

A TCP/IP Transport Layer protocol.

58

IP

Internet Protocol. Responsible for taking the formatted segments from TCP, encapsulating them into packets, assigning them the appropriate addresses, and delivering them across the best path to the destination host.

A TCP/IP Internet Layer protocol.

59

TCP/IP model

(or the Internet model)

Application
Transport
Internet
Network Access

Defines the four categories of functions that must occur for communications to be successful.

60

DNS

Domain Name System/Service. Translates domain names into IP addresses.

TCP/IP Application Layer protocol