Configuring a Network Operating System Chap 2 Flashcards

1
Q

What is the portion of the OS code that interacts directly with the computer hardware?

A

kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The user interface that allows users to request specific tasks from the computer either through the cli or gui interfaces

A

shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the physical part of a computer including underlying electronics?

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the semi-permanent memory where the IOS file is stored?

A

flash

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Where is the IOS copied to when the device is powered on?

A

RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What are the 3 ways to access the CLI environment?

A

console, telnet or ssh, aux port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which port provides out-of-band and is preferred because it provides troubleshooting (startup, debugging, and error messages)?

A

Console port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Method for remotely establishing a CLI session of a device, through a virtual interface, over a network.

A

telnet or ssh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Provides remote login with stronger password authentication and uses encryption when transporting session data.

A

secure shell or ssh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

An older way, also out-of-band, to establish a CLI session remotely is via a telephone dialup connection using a modem connected to the:

A

auxiliary port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

You are in the equipment room with a new switch that needs to be configured. Which access method would you use?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The device you are configuring cannot be accessed by cable, because you are not in the building. You use a telephone to dial into it. Which access method would you use?

A

Aux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Your manager gives you a special cable and tells you to use it to configure the switch. Which access method would you use?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

You access the IOS by using another intermediary device over a network connection. Which access method would you use?

A

Telnet/SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

You are on vacation and need to check on one of your routers. The only access you have is your hotel analog phone. Which access method would you use?

A

Aux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

You do not need remote access services to the networking device to configure it because the device is physically accessible to you. Which access method would you use?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

You call your manager to tell him you cannot access your router in another city over the Internet. He provides you with the information to access the switch through a telephone connection. Which access method would you use?

A

Aux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The password for a device was changed. No one knows what the new password is and you need to reset a new password. Which access method would you use?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

You use a password-encrypted connection to remotely access a device over a network. Which access method would you use?

A

telnet/ssh

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

IOS mode that allows only a limited number of basic monitoring commands and is often referred to as view-only mode.

A

user exec mode

21
Q

IOS mode that allows all monitoring commands by default as well as execution of configuration and management commans.

A

privileged exec mode

22
Q

identified by the cli prompt that ends with > symbol

A

user exec mode

23
Q

mode can be identified by the prompt ending with the # symbol

A

privileged exec mode

24
Q

The primary configuration mode, configuration changes are made here that affect the operation of the device as a whole.

A

global configuration mode

25
mode that can be identified with (config)#
global configuration mode
26
mode that can be identified with (config-if)#
interface mode
27
mode that can be identified with (config-line)#
line mode
28
Allows the user to scroll forward through former commands
Down Arrow
29
Allows the user to scroll backward through former commands
Up Arrow
30
Completes the remainder of a partially typed command or keyword
tab
31
Moves to the beginning of the line
ctrl-a
32
Moves to the end of the line
Ctrl-E
33
Redisplays a line
ctrl-r
34
Exits the configuration mode and returns to user EXEC
ctrl-z
35
Exits the configuration mode or aborts the current command
Ctrl-C
36
Allows the user to interrupt an IOS process such as ping or traceroute
Ctrl-Shift-6
37
Hostname guidelines for naming conventions are that names should:
``` Start with a letter Contain no spaces End with a letter or digit Use only letters, digits, and dashes Be less than 64 characters in length ```
38
Limits access to the privileged EXEC mode
enable password
39
Encrypted, limits access to the privileged EXEC mode
enable secret
40
Limits device access using the console connection
console password
41
Limits device access over Telnet
vty password
42
the banner that will be displayed on all subsequent attempts to access the device until the banner is removed.
motd banner
43
command that is the best way to return a the configuration back to the original configuration assuming that we have not overwritten the startup config with the changes
reload
44
command to clear the startup config
erase startup-config
45
command that needs to be used to delet the vlan data when returning a device to its default out of box configuration
delete vlan.dat
46
command that lists the complete configuration currently active in RAM
show running-config
47
command that lists the configuration currently in nvram
show startup-config
48
command to copy the configuration in RAM into NVRAM
copy running-config startup-config
49
what is the address that is defined by the TCP/IP protocol as a reserved address that routes packets back to the host.
loopback address 127.0.0.1