Elective 1: Midterm Flashcards

1
Q

PURPOSE:
* Allow you to connect with remote devices, perform basic tests, temporary change terminal setting, list system information
PROMPT:
* ___

A

✧ User EXEC
Switch >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

COMMAND TO ENTER:
* Default mode after booting. Login with password, if configured.

A

✧ User EXEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

PURPOSE:
* Allow you to set operating parameters. It also includes high level testing and list commands like show, copy, debug.
PROMPT:
___

A

✧ Privileged EXEC
* Switch #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

COMMAND TO ENTER:
* Use enable command from user exec mode

A

✧ Privileged EXEC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

COMMAND TO ENTER:
* Use configure terminal command from privileged exec mode

A

✧ Global Configuration

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

PURPOSE:
* Contain commands those affect the entire system
PROMPT:
* ___

A

✧ Global Configuration
Switch (config)#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Default mode after booting

A

Switch >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Note: This command allows you to enter into privileged exec mode / enable mode, where you can configure a range of commands.

A

Switch > enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Note: This command allows you to enter into Global Configuration Mode, where you configure a wide range of commands which effect the entire system.

A

Switch #
Switch # configure terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_ is a special character which is uses before starting and ending of a message.

A

#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Setting a Banner
When someone connects to the Switch , the MOTD ( Message of the Day ) banner appears before the login prompt.

A

GIFT > enable
GIFT # configure terminal
GIFT ( config ) # banner motd # WELCOME TO GIFT #
GIFT ( config ) # exit
GIFT >

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Changing Hostname

A

Switch > enable
Switch # configure terminal
Switch (config ) # hostname GIFT
GIFT ( config ) # exit
GIFT #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Some Basic Switch Commands

A
  1. ?
  2. Enable
  3. Configure Terminal
  4. Tab
  5. Show Version
  6. Show-Mac-Table
  7. Show IP Interfaces Brief
  8. Show Vlan
  9. Show running configuration
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Use to show commands in any mode

COMMAND: __

A

?

Switch > ?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use to enter into privileged mode

COMMAND: __

A

Enable

Switch > enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Use to enter into Global confi. Mode

COMMAND:
_

A

Configure Terminal

Switch # Configure Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use to complete the command

COMMAND: _

A

Tab

Switch # confi term

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Use to show the Hardware Information

COMMAND: _

A

Show Version

Switch # show version

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Use to show the MAC Address Table

COMMAND:
_

A

Show-Mac-Table

Switch # show mac-address-
table

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Use to show the information about IP interfaces

COMMAND: _

A

Show IP Interfaces Brief

Switch # show ip interface
brief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Use to show information about VLANs

COMMAND: _

A

Show Vlan

Switch # show vlan

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Use to show information about running configuration

COMMAND: _

A

Show running configuration

Switch # show running-config

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

_ is use to save current configuration into NVRAM - Non-volatile

A

Write Command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Line Console Password

A

GIFT > enable
GIFT # configure terminal
GIFT (config) # line console 0
GIFT (config-line) # password TEST123
GIFT (config-line) # login
GIFT (config-line) # exit
GIFT (config ) # exit
GIFT # exit
GIFT > enable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Note: _ is used for checking enable password.
Login command
23
Password for Privileged Mode
GIFT > enable GIFT # configure terminal GIFT (config) # enable password TEST123 GIFT (config ) # exit GIFT #
24
Removing Line Console Password
GIFT > enable GIFT # configure terminal GIFT (config) # line console 0 GIFT (config-line) # no login GIFT (config-line) # no password GIFT (config-line) # end GIFT #
25
Removing Password for Privileged Exec Mode
GIFT > enable GIFT # configure terminal GIFT (config) # no enable password GIFT (config-line) # end GIFT #
26
_ is the address of device in network. _ allows us to set IP address on interface level. _ is used to manage that particular interface. To _ we have to assign IP address to VLAN1( Default VLAN of switch). Also set default gateway IP address from global configuration mode.
IP address Switch IP address assigned on interface manage entire switch
27
Basic Steps to Configure a Router
1. Configure hostname 2. Configure passwords * Enable / enable secret * Console (con 0) * Virtual terminal (vty) 3. Configure interfaces 4. Configure routing protocol 5. Configure hostname table
28
Configuring the Router Hostname
Router#config t Router(config)#hostname Router_A Router_A(config)#exit / end Router_A#
29
Password Configuration * Passwords are set for:
* privileged EXEC mode * line passwords
30
* Setting Passwords are set for: * privileged EXEC mode * Enable password
Router(config)#enable password cisco
31
* Enable secret password
Router(config)#enable secret class
32
show commands
* show interfaces * show controllers serial * show clock * show hosts * show users * show history * show flash * show version * show ARP * show protocol * show startup-configuration * show running-configuration
32
* line passwords * console interface
* Router(config)#line console 0 *Router(config-line)#password cisco *Router(config-line)#login
33
* VTY (virtual terminals)
* Router(config)#line vty 0 4 *Router(config-line)#password cisco *Router(config-line)#login
34
stats on the router interfaces
show interfaces
35
hardware info re: serial interfaces
show controllers serial
36
Shows the wall-time clock in the router
show clock
37
Displays a cached list of host names and addresses
show hosts
38
history of commands executed
show history
39
Displays all users who are connected to the router
show users
40
info about flash memory and its IOS
show flash
41
Displays the ARP table of the router
show ARP
41
info about router and IOS running in RAM
show version
42
Displays the global and interface specific status of each configured Layer 3 protocol
show protocol
42
Displays the configuration currently in RAM
show running-configuration
43
Displays the saved configuration located in NVRAM
show startup-configuration
44
Configuring a serial interface
Router#config t Router(config)#interface serial 0/0/0 Router(config-if)#ip address 192.10.10.1 255.255.255.0 Router(config-if)#clock rate 64000 (if DCE is connected) Router(config-if)#no shutdown
45
A _ is by default administratively down, until it is brought up
router
46
The _ is the determining factor with regard to DTE or DCE not the router. One end of the cable is always a DTE and the other is always a DCE.
cable DTE or DCE
46
A _ is by default a _ – If connecting one router to another one interface must define the clock – the DCE end of the cable (wire).
router DTE Device
47
Configuring an Ethernet interface
Router#config t Router(config)#interface fastethernet 0/0 Router(config-if)#ip address 192.10.10.1 255.255.255.0 Router(config-if)#no shutdown
48
* Can convey message to all users * Might want to include a warning not to access the device * Use a delimiting character before and after “ _ “ Router#config t Router(config)#banner motd # Authorized Users Only!!! #
Login Banners #
49
Saving Configuration Files Save the Router configuration using the:
copy running-config startup-config command. Router#copy running-config startup-config Building configuration... [OK] Router#
50
The cheapest cable use in computer in networking is the _ cable. Other use the _ cable which is cost much than _ but more reliable.
UTP CABLE UTP (Unshielded Twisted Pair) STP (Shielded Twisted Pair) UTP
51
RJ means _. This is a standard physical Network Interface used for connecting telecommunications equipment commonly, a computer networking equipment.
RJ45 Registered Jack
52
_ is used to join the RJ-45 and RJ-11 connectors to the both ends of either phone or CAT5 cable.
CRIMPER Crimping tool
53
A tool designed to remove the protective covering (jacket) off of a cable to expose the inner wires. Because different wires come in different shapes, there are dozens of different wire strippers available.
WIRE STRIPPER
54
A cable tester is a device that is used to test the strength and connectivity of a particular type of cable or other wired assemblies.
LAN TESTER
55
is also referred to as an Ethernet card and network adapter. It is an expansion card that enables a computer to connect to a network;
Network Interface Card or NIC
56
CROSSOVER
SIDE ONE: White Orange Orange White Green Blue White Blue Green White Brown Brown SIDE TWO: White Green Green White Orange Blue White Blue Orange White Brown Brown
57
Use Crossover Cables For The Following Cabling:
* Switch to switch * Switch to hub * Hub to hub * Router to router * Router Ethernet port to PC NIC * PC to PC
58
STRAIGHT-THROUGH CABLING
SAME ANG SIDE ONE & TWO: White Orange Orange White Green Blue White Blue Green White Brown Brown
59
* A backup plan that is designed to restore and recover data and computer functionality in the event of a disaster such as a computer or server failure
Computer Disaster Recovery Plan
60
* What can happen when there is no computer disaster recovery plan?
* company/customer data is lost * company operations may become disrupted * operations may never return to the pre-disaster state
61
* What can happen when there is no computer disaster recovery plan?
* Software Failure * Hardware Failure
62
a crash or cessation of processing because of a logic error in a program or key files have become corrupt or damaged
* Software Failure
63
computers fail in varying degrees of severity. The worst failures impact the ability for the computer to function at all
* Hardware Failure
64
The computer is unable to load the operating system
* Hard drive failure
65
Software can affect hardware by corrupting its firmware and causing the hardware to overheat and fail.
* Other component failure
66
The screen will be black with no signal.
* Video card failure
67
making copies of important data, files, and computer system settings
Data backup
67
* Preventative strategies:
* data backup * redundant hardware setups * security software * defragmentation * proper cooling
68
* On-site backups
* Raid 0 * Manual on-site backup
69
* The computer has two of the same-sized hard drives where the same data is written to both drives ----- Is performed through BIOS and operating system settings ----- Quickest means of recovery when a hard drive failure occurs because of the system’s redundancy
* Raid 0
70
Data is backed up to another drive or location at regular intervals
Manual on-site backup
71
Utilizes servers or cloud-based systems for backup locations
* Off-Site Backup
72
* software applications are designed to protect the computer and its systems --- Antivirus, Firewall, and other security software suites allow for better protection of a computer’s files and systems
* Security software
73
the process where files on the hard drive are put back into their proper order, increasing performance and proper file management
* Defragmentation
74
heat causes hardware failures. Proper cooling is necessary for a computer to operate correctly
* Proper cooling
75
Looking at the activity log is helpful in troubleshooting the computer
* System performance test
76
Detection strategies
* software notifications * system performance tests * user detection
76
Computer Disaster Recovery Plan: ____ * ____: Operating systems today incorporate some form of software or hardware diagnostic tool to aid the user in troubleshooting the computer -- They are designed to notify the user of a potential malfunction or to run a check for a fault
Detection * Software notifications
77
The user generally knows what is supposed to happen with a particular software package or operating system. When things don’t work the way they are supposed to, a user detects the problem
* User Detection
78
Corrective/Reactive strategies
* identify the problem * assess the areas that are affected * repair or replace the affected hardware/software * confirm through testing that the problem has been corrected
78
Computer Disaster Recovery Plan: ___ ⚫____ ⚫___
Corrective Strategy ⚫Identify the problem ⚫What is affected
79
: Is the problem software or hardware related?
⚫Identify the problem
80
diagnose hardware failures using the utility that comes pre-installed with the operating system. Replace any hardware that might be faulty. Software is usually diagnosed by the user or with the appearance of error messages
⚫What is affected:
81
* ___: repair/restore/reinstall software when it fails to function correctly. * ____: Replace faulty hardware and reinstall drivers as necessary --- Confirm through testing that the problem has been resolved
* Repair/Replace * ___: repair/restore/reinstall software when it fails to function correctly. * ____: Replace faulty hardware and reinstall drivers as necessary
82
* The process and practice of keeping a computer in good working order
COMPUTER PREVENTATIVE MAINTENANCE
83
COMPUTER PREVENTATIVE MAINTENANCE
* Involves maintaining both the hardware and the software on the computer
84
COMPUTER PREVENTATIVE MAINTENANCE
* Should be performed every 3-6 months
85
COMPUTER PREVENTATIVE MAINTENANCE * Hardware
- Listen - Clean dust out - Look at computer specs
86
- make note of the hardware in the machine * As a computer ages, it has trouble keeping up with newer software requirements
Look at computer specs
87
while the computer is running, listen for odd sounds such as clicking or other abnormal noises
Listen
88
- using a vacuum, place suction at both the exhaust and intake vents on the computer where buildup is visible * This returns airflow to components that generate heat and allows the machine to run more efficiently while decreasing the likelihood of failure * Canned air is also an option for blowing dust from a computer. Open the case for best results
clean dust out
88
make copies of important files. Can be done on external media, a hard drive, online backup, or to a virtual location like the cloud
Backup
89
COMPUTER PREVENTATIVE MAINTENANCE * Software
* Backup * Check computer security * Empty cache, delete any unwanted or temp files * Update drivers
89
- periodically, perform an entire scan of the computer’s hard drive * To perform a scan, open the security software application and select the complete system scan * Make note of security software renewal dates. If the subscription has expired, you will not have active protection.
Check computer security
90
The reason for preventative maintenance
* to prevent unnecessary and premature hardware failures * to ensure that software is up to date and functioning at optimal levels * for an extra degree of protection in backing up key files and documents * to help extend the life of the computer
91
will enhance the computer’s performance and make it more stable
Update drivers
92
clear the cookies from your Internet browser, delete emails, empty the trash, and delete any temporary files by performing a disk cleanup and defragmentation of the hard drive
Empty cache, delete any unwanted or temp files