Module 2 - Basic Switch & End Device Configuration Flashcards
(36 cards)
Which part of the operating system is the user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.
a. Hardware
b. Shell
c. Kernal
d. UEFI
b. Shell
Which part of the operating system communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
a. Hardware
b. Shell
c. Kernal
d. UEFI
c. Kernal
Which part of the operating system is the physical part of a computer including underlying electronics.
a. Hardware
b. Shell
c. Kernal
d. UEFI
a. Hardware
A ___ allows the user to interact with the system using an environment of graphical icons, menus, and windows.
a. CLI
b. CMOS
c. IOS
d. GUI
d. GUI
GUIs can fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a ___.
a. CLI
b. CMOS
c. IOS
d. GUI
a. CLI
Which of these is NOT a function of a CLI based network operating system
a. Use a keyboard to run CLI-based network programs
b. Use a keyboard to enter text and text-based commands
c. Use a mouse to make selections and run programs
d. View output on a monitor
c. Use a mouse to make selections and run programs
Name TWO functions of a standard PC operating system
a. Use a mouse to make selections and run programs
b. Enter text and text-based commands
c. Use a keyboard to run CLI-based network programs
d. Configure a Switch using CLI commands
a. Use a mouse to make selections and run programs
b. Enter text and text-based commands
What access method is a physical management port used to access a device in order to provide maintenance, such as performing the initial configurations.
a. Telnet
b. HTTPS
c. Console
d. Secure Shell (SSH)
c. Console
What access method establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.)
a. Telnet
b. HTTPS
c. Console
d. Secure Shell (SSH)
d. Secure Shell (SSH)
What access method establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords and commands are sent over the network in plaintext.)
a. Telnet
b. HTTPS
c. Console
d. Secure Shell (SSH)
a. Telnet
_______________ programs are used to connect to a network device by either a console port or by an SSH/Telnet connection.
a. Abort
b. Terminal emulation
c. Terminal Sender
d. Network
b. Terminal emulation
Which of these is NOT a terminal emulation program?
a. PuTTY
b. Tera Term
c. SecureCRT
d. Privileged Exec
d. Privileged Exec
Select TWO functions of EXEC Mode.
a. Allows access to only a limited number of basic monitoring commands
b. Allows access to all commands and features
c. Identified by the CLI prompt that ends with the > symbol
d. Identified by the CLI prompt that ends with the # symbol
a. Allows access to only a limited number of basic monitoring commands
c. Identified by the CLI prompt that ends with the > symbol
Select TWO functions of Privileged EXEC Mode.
a. Allows access to only a limited number of basic monitoring commands
b. Allows access to all commands and features
c. Identified by the CLI prompt that ends with the > symbol
d. Identified by the CLI prompt that ends with the # symbol
b. Allows access to all commands and features
d. Identified by the CLI prompt that ends with the # symbol
What is a function of Global Configuration Mode
a. Allows access to only a limited number of basic monitoring commands
b. Used to access configuration options on the device
c. Used to configure console, SSH, Telnet or AUX access
d. Used to configure a switch port or router interface
b. Used to access configuration options on the device
What is a function of Line Configuration Mode
a. Allows access to only a limited number of basic monitoring commands
b. Used to access configuration options on the device
c. Used to configure console, SSH, Telnet or AUX access
d. Used to configure a switch port or router interface
c. Used to configure console, SSH, Telnet or AUX access
What is a function of Interface Configuration Mode
a. Allows access to only a limited number of basic monitoring commands
b. Used to access configuration options on the device
c. Used to configure console, SSH, Telnet or AUX access
d. Used to configure a switch port or router interface
d. Used to configure a switch port or router interface
True or False: In the Basic IOS Command Structure a Keyword is a specific parameter defined in the operating system (in the figure,ip protocols).
True
True or False: In the Basic IOS Command Structure an argument is not predefined; it is a value or variable defined by the user (in the figure,192.168.10.5).
True
Within the CLI, what is the function of the Tab keystroke
a. Completes a partial command name entry.
b. Erases the character to the left of the cursor.
c. Moves the cursor one character to the left.
d. Moves the cursor one character to the right.
a. Completes a partial command name entry.
Within the CLI, what is the function of the Backspace keystroke
a. Completes a partial command name entry.
b. Erases the character to the left of the cursor.
c. Moves the cursor one character to the left.
d. Moves the cursor one character to the right.
b. Erases the character to the left of the cursor.
Within the CLI, what is the function of the Left Arrow orCtrl+B
keystroke
a. Completes a partial command name entry.
b. Erases the character to the left of the cursor.
c. Moves the cursor one character to the left.
d. Moves the cursor one character to the right.
c. Moves the cursor one character to the left.
Within the CLI, what is the function of the Right Arrow orCtrl+F
keystroke
a. Completes a partial command name entry.
b. Erases the character to the left of the cursor.
c. Moves the cursor one character to the left.
d. Moves the cursor one character to the right.
d. Moves the cursor one character to the right.
Within the CLI, what is the function of the Up Arrow orCtrl+P
keystroke
a. Displays the next line.
b. Ends the display string, returning to privileged EXEC mode.
c. Displays the next screen.
d. Recalls the commands in the history buffer, beginning with the most recent commands.
d. Recalls the commands in the history buffer, beginning with the most recent commands.