Module 2 - Basic Switch & End Device Configuration Flashcards

1
Q

Which part of the operating system is the user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.

a. Hardware
b. Shell
c. Kernal
d. UEFI

A

b. Shell

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which part of the operating system communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.

a. Hardware
b. Shell
c. Kernal
d. UEFI

A

c. Kernal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which part of the operating system is the physical part of a computer including underlying electronics.

a. Hardware
b. Shell
c. Kernal
d. UEFI

A

a. Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ___ allows the user to interact with the system using an environment of graphical icons, menus, and windows.

a. CLI
b. CMOS
c. IOS
d. GUI

A

d. GUI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

GUIs can fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a ___.

a. CLI
b. CMOS
c. IOS
d. GUI

A

a. CLI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Which of these is NOT a function of a CLI based network operating system

a. Use a keyboard to run CLI-based network programs
b. Use a keyboard to enter text and text-based commands
c. Use a mouse to make selections and run programs
d. View output on a monitor

A

c. Use a mouse to make selections and run programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Name TWO functions of a standard PC operating system

a. Use a mouse to make selections and run programs
b. Enter text and text-based commands
c. Use a keyboard to run CLI-based network programs
d. Configure a Switch using CLI commands

A

a. Use a mouse to make selections and run programs
b. Enter text and text-based commands

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What access method is a physical management port used to access a device in order to provide maintenance, such as performing the initial configurations.

a. Telnet
b. HTTPS
c. Console
d. Secure Shell (SSH)

A

c. Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What access method establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.)

a. Telnet
b. HTTPS
c. Console
d. Secure Shell (SSH)

A

d. Secure Shell (SSH)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What access method establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords and commands are sent over the network in plaintext.)

a. Telnet
b. HTTPS
c. Console
d. Secure Shell (SSH)

A

a. Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

_______________ programs are used to connect to a network device by either a console port or by an SSH/Telnet connection.

a. Abort
b. Terminal emulation
c. Terminal Sender
d. Network

A

b. Terminal emulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of these is NOT a terminal emulation program?

a. PuTTY
b. Tera Term
c. SecureCRT
d. Privileged Exec

A

d. Privileged Exec

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Select TWO functions of EXEC Mode.

a. Allows access to only a limited number of basic monitoring commands
b. Allows access to all commands and features
c. Identified by the CLI prompt that ends with the > symbol
d. Identified by the CLI prompt that ends with the # symbol

A

a. Allows access to only a limited number of basic monitoring commands

c. Identified by the CLI prompt that ends with the > symbol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Select TWO functions of Privileged EXEC Mode.

a. Allows access to only a limited number of basic monitoring commands
b. Allows access to all commands and features
c. Identified by the CLI prompt that ends with the > symbol
d. Identified by the CLI prompt that ends with the # symbol

A

b. Allows access to all commands and features

d. Identified by the CLI prompt that ends with the # symbol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a function of Global Configuration Mode

a. Allows access to only a limited number of basic monitoring commands
b. Used to access configuration options on the device
c. Used to configure console, SSH, Telnet or AUX access
d. Used to configure a switch port or router interface

A

b. Used to access configuration options on the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is a function of Line Configuration Mode

a. Allows access to only a limited number of basic monitoring commands
b. Used to access configuration options on the device
c. Used to configure console, SSH, Telnet or AUX access
d. Used to configure a switch port or router interface

A

c. Used to configure console, SSH, Telnet or AUX access

16
Q

What is a function of Interface Configuration Mode

a. Allows access to only a limited number of basic monitoring commands
b. Used to access configuration options on the device
c. Used to configure console, SSH, Telnet or AUX access
d. Used to configure a switch port or router interface

A

d. Used to configure a switch port or router interface

17
Q

True or False: In the Basic IOS Command Structure a Keyword is a specific parameter defined in the operating system (in the figure,ip protocols).

A

True

17
Q

True or False: In the Basic IOS Command Structure an argument is not predefined; it is a value or variable defined by the user (in the figure,192.168.10.5).

A

True

18
Q

Within the CLI, what is the function of the Tab keystroke

a. Completes a partial command name entry.
b. Erases the character to the left of the cursor.
c. Moves the cursor one character to the left.
d. Moves the cursor one character to the right.

A

a. Completes a partial command name entry.

19
Q

Within the CLI, what is the function of the Backspace keystroke

a. Completes a partial command name entry.
b. Erases the character to the left of the cursor.
c. Moves the cursor one character to the left.
d. Moves the cursor one character to the right.

A

b. Erases the character to the left of the cursor.

20
Q

Within the CLI, what is the function of the Left Arrow orCtrl+B
keystroke

a. Completes a partial command name entry.
b. Erases the character to the left of the cursor.
c. Moves the cursor one character to the left.
d. Moves the cursor one character to the right.

A

c. Moves the cursor one character to the left.

21
Q

Within the CLI, what is the function of the Right Arrow orCtrl+F
keystroke

a. Completes a partial command name entry.
b. Erases the character to the left of the cursor.
c. Moves the cursor one character to the left.
d. Moves the cursor one character to the right.

A

d. Moves the cursor one character to the right.

22
Q

Within the CLI, what is the function of the Up Arrow orCtrl+P
keystroke

a. Displays the next line.
b. Ends the display string, returning to privileged EXEC mode.
c. Displays the next screen.
d. Recalls the commands in the history buffer, beginning with the most recent commands.

A

d. Recalls the commands in the history buffer, beginning with the most recent commands.

23
Q

Within the CLI, what is the function of the Enter keystroke

a. Displays the next line.
b. Ends the display string, returning to privileged EXEC mode.
c. Displays the next screen.
d. Recalls the commands in the history buffer, beginning with the most recent commands.

A

a. Displays the next line.

24
Q

Within the CLI, what is the function of the Space Bar keystroke

a. Displays the next line.
b. Ends the display string, returning to privileged EXEC mode.
c. Displays the next screen.
d. Recalls the commands in the history buffer, beginning with the most recent commands.

A

c. Displays the next screen.

25
Q

Within the CLI, what is the function of any other key

a. Displays the next line.
b. Ends the display string, returning to privileged EXEC mode.
c. Displays the next screen.
d. Recalls the commands in the history buffer, beginning with the most recent commands.

A

b. Ends the display string, returning to privileged EXEC mode.

26
Q

Within the CLI, what is the function of the Ctrl-C keystroke

a. Completes a partial command name entry.
b. When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode.
c. Ends the display string, returning to privileged EXEC mode.
d. All-purpose break sequence used to abort DNS lookups, traceroutes, pings, etc.

A

b. When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode.

27
Q

Within the CLI, what is the function of the Ctrl-Z keystroke

a. Completes a partial command name entry.
b. When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode.
c. Ends the display string, returning to privileged EXEC mode.
d. All-purpose break sequence used to abort DNS lookups, traceroutes, pings, etc.

A

b. When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode.

28
Q

Within the CLI, what is the function of the Ctrl-Shift-6 keystroke

a. Completes a partial command name entry.
b. When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode.
c. Ends the display string, returning to privileged EXEC mode.
d. All-purpose break sequence used to abort DNS lookups, traceroutes, pings, etc.

A

d. All-purpose break sequence used to abort DNS lookups, traceroutes, pings, etc.

29
Q

The use of ___________ is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet.

a. Default Gateways
b. Routers
c. IP Addresses
d. Subnetting

A

c. IP Addresses

30
Q

The structure of an IPv4 address is called dotted decimal notation and is represented by four decimal numbers between ______

a. 0-128
b. 64-255
c. 0-256
d. 0-255

A

d. 0-255

31
Q

What is the bit value of a IPv4 subnet mask
a.128 bit
b. 32 bit
c. 64 bit
d. 28 bit

A

b. 32 bit

32
Q

What is the purpose of a default gateway?

a. It is the IP address for a switch connected to multiple LANs, used to send traffic between LANs
b. It is the IP Address for a single user PC
c. It is the IP address of the router that the host will use to access remote networks, including the internet
d. It is the IP Address used for broadcast messages within a LAN

A

c. It is the IP address of the router that the host will use to access remote networks, including the internet

33
Q

IPv6 addresses are _______ in length and written as a string of hexadecimal values.

a. 128 bits
b. 32 bits
c. 255 bits
d. 64 bits

A

a. 128 bits

34
Q

Which of these is NOT a type of network media cable?

a. Copper
b. Fibre-optic
c. Wireless
d. Power

A

d. Power