Module 2 Flashcards

1
Q

the portion of the OS that interacts directly with computer hardware is known as the

A

kernel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The portion that interfaces with applications and the user is known as the

A

shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

When using a _____ the user interacts directly with the system in a text-based environment by entering commands on the keyboard at a command prompt

A

CLI (Command Line Interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A _______ such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows

A

GUI (graphical user interface)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Regarding Operating systems.. The ____ is less resource intensive and very stable when compared to a ____.

A

CLI; GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

network devices are typically accessed through a

A

CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The operating system on home routers is usually called

A

firmware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The most common method for configuring a home router is by using a web browser-based

A

GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

This is a physical management port that provides out-of-band access to a Cisco device

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

refers to access via a dedicated management channel that is used for device maintenance purposes only

A

out-of-band access

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.

A

Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which access method would be the most appropriate in-band access to the IOS over a network connection?

A

Telnet/SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection?

A

Aux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Mode allows access to only a limited number of basic monitoring commands.
It is often referred to as “view-only” mode.

A

User Exec Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Mode allows access to all commands and features.

The user can use any monitoring commands and execute configuration and management commands.

A

Priviliged EXEC mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Default Device Prompt for User Exec Mode

A

Switch>

Router>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Default Device Prompt for Priviliged exec mode

A

Switch #

Router #

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

identified by a prompt that ends with (config)# after the device name, such as Switch(config)#.

A

Global Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

From global config mode, the user can enter different

A

subconfiguration modes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Used to configure console, SSH, Telnet, or AUX access.

A

Line Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Used to configure a switch port or router network interface.

A

Interface Configuration Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
By default, every prompt begins with... | Following the name, the remainder of the prompt indicates the....
the device name. | mode.
26
To move from user EXEC mode to privileged EXEC mode, use the
Enable Command
27
Use the disable privileged EXEC mode command to return to...
user EXEC mode.
28
Privileged EXEC mode is sometimes called
Enable Mode
29
To move from any sub configuration mode to the privileged EXEC mode, enter the end command or....
enter the key combination Ctrl+Z.
30
To enter global configuration mode type
configure terminal
31
Enter line subconfiguration mode for the console port , type...
line console 0
32
Enter VTY line subconfiguration by typing...
line vty 0 15
33
Enter the VLAN 1 interface subconfiguration mode by typing...
interface vlan 1
34
Which IOS mode allows access to all commands and features?
Privileged EXEC mode
35
Which IOS mode are you in if the Switch(config)# prompt is displayed?
Global configuration mode
36
Which IOS mode are you in if the Switch> prompt is displayed?
User EXEC mode.
37
CTRL+Z and end will return you to the ________________ regardless of the configuration mode you are in.
privileged EXEC prompt
38
The general syntax for a command is the command followed by ....
any appropriate keywords and arguments.
39
This is a specific parameter defined in the operating system
Keyword
40
This is not predefined; it is a value or variable defined by the user
Argument
41
text indicates arguments for which you supply values.
italics
42
text indicates commands and keywords that you enter literally as shown.
boldface
43
____ indicate an optional element (keyword or argument).
square brackets [x]
44
____- indicate a required element (keyword or argument).
Braces {x}
45
____ indicate a required choice within an optional element
Braces and vertical lines within square brackets | [x {y | z } ]
46
What is the command to assign the name “Sw-Floor-2” to a switch?
hostname (in bold) Sw-Floor-2
47
How is the privileged EXEC mode access secured on a switch?How is the privileged EXEC mode access secured on a switch?
enable secret class | *all in bold
48
Which command enables password authentication for user EXEC mode access on a switch?
login (bold)
49
Which command encrypts all plaintext passwords access on a switch?
service password-encryption | *all in bold
50
Which is the command to configure a banner to be displayed when connecting to a switch?
banner motd $ Keep out $ | *all in bold
51
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.
startup-config
52
This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
running-config
53
The show running-config privileged EXEC mode command is used to
view the running config
54
a 32-bit value that differentiates the network portion of the address from the host portion
IPv4 subnet mask
55
The structure of an IPv4 address is called
dotted decimal notation
56
the IP address of the router that the host will use to access remote networks, including the internet.
The default gateway address
57
How is an IPv4 address represented?
four decimal numbers between 0 and 22 separated by periods.
58
What type of interface has no physical port associated with it?
switch virtual interface (SVI)
59
how to manually configure an IPv4 address on a Windows host, you open the....
Control Panel > Network Sharing Center > Change adapter settings and choose the adapter. Then right-click and select Properties to display the Local Area Connection Properties.
60
enables automatic IPv4 address configuration for every end device
DHCP ( Dynamic host configuration protocol)
61
This affects the operation of the device immediately when modified...
running configuration file in a Cisco IOS device
62
Which type of access is secured on a Cisco router or switch with the enable secret command?
privliged EXEC
63
What is the default SVI on a Cisco switch?
VLAN1
64
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines?
fewer than 64 characters in length. contain no spaces. begin with a letter.
65
What is the function of the shell in an OS?
Interfaces between the users and the kernel.
66
A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?
user EXEC mode
67
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
68
Which memory location on a Cisco router or switch will lose all content when the device is restarted?
RAM
69
Why would a technician enter the command copy startup-config running-config?
to copy an existing configuration into RAM
70
Main functionality is provided by DHCP?
automatic assignment of an IP address to each host.
71
Which memory location on a Cisco router or switch stores the startup configuration file?
NVRAM
72
Exec command that Opens a terminal connection.
connect
73
Exec command that turns off priviliged commands
disable
74
exec command that disconnects an existing network connection.
disconnect
75
exec command that turns on priviliged commands
enable