Module 2 - Basic Switch & End Device Configuration Flashcards
Which part of the operating system is the user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.
a. Hardware
b. Shell
c. Kernal
d. UEFI
b. Shell
Which part of the operating system communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
a. Hardware
b. Shell
c. Kernal
d. UEFI
c. Kernal
Which part of the operating system is the physical part of a computer including underlying electronics.
a. Hardware
b. Shell
c. Kernal
d. UEFI
a. Hardware
A ___ allows the user to interact with the system using an environment of graphical icons, menus, and windows.
a. CLI
b. CMOS
c. IOS
d. GUI
d. GUI
GUIs can fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a ___.
a. CLI
b. CMOS
c. IOS
d. GUI
a. CLI
Which of these is NOT a function of a CLI based network operating system
a. Use a keyboard to run CLI-based network programs
b. Use a keyboard to enter text and text-based commands
c. Use a mouse to make selections and run programs
d. View output on a monitor
c. Use a mouse to make selections and run programs
Name TWO functions of a standard PC operating system
a. Use a mouse to make selections and run programs
b. Enter text and text-based commands
c. Use a keyboard to run CLI-based network programs
d. Configure a Switch using CLI commands
a. Use a mouse to make selections and run programs
b. Enter text and text-based commands
What access method is a physical management port used to access a device in order to provide maintenance, such as performing the initial configurations.
a. Telnet
b. HTTPS
c. Console
d. Secure Shell (SSH)
c. Console
What access method establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.)
a. Telnet
b. HTTPS
c. Console
d. Secure Shell (SSH)
d. Secure Shell (SSH)
What access method establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords and commands are sent over the network in plaintext.)
a. Telnet
b. HTTPS
c. Console
d. Secure Shell (SSH)
a. Telnet
_______________ programs are used to connect to a network device by either a console port or by an SSH/Telnet connection.
a. Abort
b. Terminal emulation
c. Terminal Sender
d. Network
b. Terminal emulation
Which of these is NOT a terminal emulation program?
a. PuTTY
b. Tera Term
c. SecureCRT
d. Privileged Exec
d. Privileged Exec
Select TWO functions of EXEC Mode.
a. Allows access to only a limited number of basic monitoring commands
b. Allows access to all commands and features
c. Identified by the CLI prompt that ends with the > symbol
d. Identified by the CLI prompt that ends with the # symbol
a. Allows access to only a limited number of basic monitoring commands
c. Identified by the CLI prompt that ends with the > symbol
Select TWO functions of Privileged EXEC Mode.
a. Allows access to only a limited number of basic monitoring commands
b. Allows access to all commands and features
c. Identified by the CLI prompt that ends with the > symbol
d. Identified by the CLI prompt that ends with the # symbol
b. Allows access to all commands and features
d. Identified by the CLI prompt that ends with the # symbol
What is a function of Global Configuration Mode
a. Allows access to only a limited number of basic monitoring commands
b. Used to access configuration options on the device
c. Used to configure console, SSH, Telnet or AUX access
d. Used to configure a switch port or router interface
b. Used to access configuration options on the device