MODULE 2 Flashcards

(76 cards)

1
Q

cisco operating systems: the user interface that allows users to request specific tasks from the computer

A

shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

in the shell, requests can be made by the user either through the - or - interfaces

A

CLI, GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

cisco operating systems: communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements

A

kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

cisco operating systems: the physical part of a computer including underlying electronics

A

hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

this allows the user to interact with the system using an environment of graphical icons, menus, and windows

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

true or false: a GUI is more user-friendly and requires less knowledge of the underlying command structure that controls the system

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

GUIs can fail, crash, or simply not operate as specified. for these reasons, network devices are typically accessed through a -

A

CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

enables a user to use a mouse to make selections and run programs, enter text and text-based commands, and view output on a monitor

A

pc operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

enables a network technician to use a keyboard to run cli-based network programs, use a keyboard to enter text and text-based commands, and view output on a monitor

A

cli-based network operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

access method : a physical management port used to access a device in order to provide maintenance, such as performing the initial configurations

A

console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

access methods: establishes a secore remote cli connection to a device, through a virtual interface, over a network

A

secure shell (ssh)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

access methods: establishes an insecure remote cli connection to a device over the network. user authentication, passwords, and commands are sent over the network in plain text

A

telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

this is used to connect a network device by either a console port or my an ssh/telnet connection

A

terminal emulation programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

allows access only to a limited number of basic monitoring commands

A

user exec mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

the user exec mode is identified by the cli prompt that ends with the - symbol

A

>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

allows access to all commands and all features

A

privileged exec mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

privileged exec mode is identified by the cli promp that ends with the - symbol

A

#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

used to access coniguration options on the device

A

global configuration mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

indicator for global configuration mode

A

switch(config) #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

used to configure console, ssh, telnet, or aux access

A

line configuration mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

indicator for line configuration mode

A

switch(config-line) #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

used to configure switch port or router interface

A

interface configuration mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

indicator for interface configuration mode

A

switch(config-if) #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

this is used to move from user exec mode to privilege exec mode

A

enable command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
this is used to move in and out of global configuration mode
configure terminal command
26
this is used to return to privilege exec mode
exit
27
this is used to move in and out of line configuration mode
line command followed by the management line type
28
used to return to global configuration mode from line configuration mode
exit
29
to move out of any subconfiguration mode to get back to global configuration mode, use the - command
exit
30
to return to privilege exec mode from any subconfiguration mode, use - command or key combination -
end, c trl + z
31
this is done to move directly from one subconfiguration mode to another
type desired subconfiguration mode command
32
the basic ios command structure
prompt - command - space - keyword or argument
33
this is a specific parametern defined in the operating system
keyword
34
this is not predefined; it is a value or variable defined by the user
argument
35
this indicates commands and keywords that you enter literally as shown
boldface
36
this indicates arguments for which you have to supply values
italic
37
this indicates an optional element
[x]
38
this indicates a required element
{x}
39
command that provides context-sensitive help that enables you to quickly find answers to command questions
?
40
this verifies that a valid command was entered by the user
command syntax check
41
true or false: the configure command can be shortened to conf because configure is the only command that begins with conf
true
42
this completes a partial command name entry
tab
43
this erases the character to the left of the cursor
backspace
44
this moves the cursor one character to the left
left arrow or ctrl+b
45
this moves the cursor one charatcer to the right
right arrow or ctrl+f
46
this recalls the commands in the history buffer, beginning with the most recent commands
up arrow or ctrl+p
47
whena command output produces more text than can be displayed in the terminal window the ios will display this prompt
--more--
48
this should be the first configuration command on any device
give it a unique hostname
49
how to give a device a hostname
- enter privilege exec mode - switch# configure terminal swittch(config)# hostname [hostname] [hostname](config)#
50
all networking devices should limit administrative access by securing privilege exec, user exec, and remote telnet access with -
passwords
51
all passowrds should be - and -
encrypted, legal notifications provided
52
how to configure password to secure exec mode access
configure terminal line console 0 password [password] login end
53
how to configure passwords to secure privilege exec mode access
configure terminal enable secret [password] exit
54
how to configure passwords to secure vty line access
configure terminal line vty 0 15 password [password] login end
55
this enables remote access using telnet or ssh to the devices.
vty lines
56
this is used to encrypt all plain text passwords
service password-encryption global config command
57
this is used to verify that passwords on a device are now encrypted
show running-config
58
this is important to warn unauthorized personnel from attempting to access a device
banner message
59
this is used to create a banner message of the day on a network device
banner motd # [message] #
60
the "#" in the command syntax is called the - . it is entered before and after a message
deliminating character
61
how to configure a banner message of the day
configure terminal banner motd # message #
62
these are the 2 file systems tha store the device configuration
suartup-config, running-config
63
this. is the saved configuration file that is stored in nvram. it contains all the commands that will be used by the device upon starrup or reboot. flash does not lose its contents when the device is powered off
startup-config
64
this is tored in random access memory. it reflects the current configuration. modifying a running configration affects the operation of a cisco device immediately.
running-config
65
to save changes made to the running configuration to the startup configuration file, use the - privilege exec mode command
startup-config
66
changes made to the running config can be changed using this. if the running-config has not yet been saved
reload command
67
true or false: the reload command does not have any effects to the network
false; it temporarily goes offline, causing downtime
68
if the undesired changes were saved to the startup-config, it may be necessary to clear all the configurations using the - comamnd in privilege exec mode
erase startup-config
69
how to save configurattion files to a text document
- open terminal emulation software - enable logging into the terminal software and assign a name and file location to save the log file - execute show running-config or show startup-config - display logging in the terminal software
70
this is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet
ip addresses
71
the structure of an ipv4 address is called -
dotted decimal notation
72
dotted decimal notation in ipv4 addressing is represented by -
4 decimal numbers between 0 and 255
73
this is a 32-bit value that differentiates the network portion of the address from the host portion. coupled with the ipv4 address, it determines to which subnet the device is a member
ipv4 subnet mask
74
this is the ip address of the router that the host will use to access remote networks, including the internet
default gateway
75
these are 128 bits in length and written as a string of hexadecimal values. every 4 bits is represented by a single hexadecimal digit for a total of 32 hexadecimal values
ipv6 adresses
76
true or false: ipv6 addresses are case sensitive
false