Chapter 2 CCNA

¡Supera tus tareas y exámenes ahora con Quizwiz!

What CLI command keyword will Undo or remove the effects of a command.

"No"

Explain what a switch virtual interface (SVIs) is.

A Switched Virtual Interface (SVI) is a virtual LAN (VLAN) of switch ports represented by one interface to a routing or bridging system. ... By default, an SVI is created for the default VLAN (VLAN1) to permit remote switch administration. An SVI cannot be activated unless associated with a physical port.

Explain why it is important to name all your networking devices.

By choosing names wisely, it is easier to remember, document, and identify network devices

Tab

Completes partially typed command or keyword Exits

Ctrl-Z

Config mode and returns to EXEC.

If you are in global configuration mode on a switch and type exit, Ctrl+Z, or end what will your prompt look like.

Config mode returns to EXEC

Ctrl-C

Ends the configuration mode and returns to privileged EXEC mode.

If you are in privileged EXEC mode on a router and type exit what will your prompt be?

Global Configuration

Which CLI mode is designed to allow a technician to configure settings on the device that affect the device as a whole?

Global Configuration Mode

Ctrl-Shift-6

Interrupts an IOS process

Why is SSH a better choice than telnet to access the CLI?

It establishes a secure CLI connection as compared to telnet which establishes an insecure connection.

If the command was: Switch(config)# line vty 0 4 What would this indicate

It is enabling remote access to the device

What is the purpose of a subnet IPv4?

Its the value that separates the network portion of the address from the host portion.

What commands are required to install a password on a routers console part?

Line Console0 <password> Login in prompt

Where is the startup configuration stored?

NVRAM

Where is the running configuration file stored while in use?

NVRAM and RAM

What does Enable Password do?

Protects configuration

What does Console Password do?

Protects console interface

Why are banners important?

Provides a method for declaring that only authorized personnel should attempt to gain entry into the device

Up Arrow

Scroll forward through former commands

What does Enable Secret do?

Secure Privilege Exec mode

What is the default switch Privileged EXEC mode prompt?

Switch# Router#

What is the command to move the device from privileged EXEC mode to global configuration mode?

Switch# configure terminal

What is the default router global configuration mode prompt?

Switch(config)#

What is the default router user EXEC mode prompt?

Switch> Router>

What command is used to enter Privileged EXEC Mode from the User EXEC mode?

Switch> enable

Explain the banner motd delimiting character?

The "#" in the command syntax is called the delimiting character. It is entered before and after the message.

What is the advantage of using a console port?

The advantage of using a console port is that the device is accessible even if no networking services have been configured, such as when performing an initial configuration of the networking device.

What will the command: Switch(config)# service password-encryption do?

The command applies weak encryption to all unencrypted passwords.

What is the running configuration?

The file stored in Random Access Memory (RAM) that reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.

What is the startup configuration file?

The startup configuration file reflects the configuration that will be used by the device upon reboot. The startup configuration file is stored in NVRAM.

What is a virtual interface?

Used to navigate to the interface configuration mode from the global configuration mode.

What does VTY password do?

Virtual teletype (VTY) is a command line interface (CLI) created in a router and used to facilitate a connection to the daemon via Telnet, a network protocol used in local area networks. To connect to a VTY, users must present a valid password.

Explain what Cisco Internetwork Operating System (IOS) refers to?

a generic term for the collection of network operating systems used by Cisco networking devices

What are the three most common ways to access the CLI?

a. Console b.Secure Shell (SSH) c.Telnet *d.Auxiliary

A user can interact with the shell using either of two methods. List and explain each.

a.CLI- The user interacts directly with the system in a text based environment by entering commands of the keyboard at a command prompt b.GUI- Allow users to interact through graphical icons

When a command returns more output than can be displaued on a single screen, the "More" prompt appears at the bottom of the screen. List two keyboard options you can use to continue the output on the screen

a.Enter Key b.Space Bar

List the terminal emulation programs shown in the curriculum.

a.PuTTY b.Tera Term c.SecureCRT d.OS X Terminal

The operating system involves three areas. List and explain each.

a.Shell- The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces b.Kernel- Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements c.Hardware- The physical part of a computer including underlying electronics

What are the recommended guidelines for naming conventions?

a.Start with a letter b.Contain no spaces c.End with a letter or digit d.Use only letters, digits, and dashes e.Be less than 64 characters in length

In hierarchical order from most basic to most specialized, list the major CLI modes

a.User Exec Mode b.Privileged EXEC Mode c.Line Configuration Mode d.Interface Configuration Mode

List and explain the two primary CLI modes of operation.

a.User Exec Mode- Mode allows access to only a limited number of basic monitoring commands. It is often refereed to as "view-only" mode. b.Privileged EXEC Mode- Mode allows access to all commands and features. The user can use any monitoring commands and execute configuration and management commands.

What is required to remotely access a switch SVI?

a.config address b.config subnet mask

What are the differences between the various types of media?

a.distance the media can successfully carry a signal b.environment in which the media is to be installed c.amount of data and the speed at which it must be transmitted d.cost of the media and installation

What commands are necessary to delete the startup configuration file on a router or switch and return it to its factory default settings

a.reload b.erase config startup

What does DHCP do?

automatically assigns IP addresses to end devices

What is the purpose of using the "Switch> show ip interface brief" command on a switch or router

command provides a quick status of the interfaces on the router, including their IP address, Layer 2 status, and Layer 3 status

What is the purpose of "0 15" in this example: Switch(config)# line vty 0 15 Switch(config) password cisco Switch(config)# login

meant to secure VTY lines use for SSH and Telnet

What is a console port?

provides out-of-band access to a Cisco device

What are the options that are available after making changes to the running configuration?

show startup-config copy running-config startup-config show running-config


Conjuntos de estudio relacionados

Chapter 9 Learning, Memory, and Development

View Set

تعاريف احياء 1 ث 1-1

View Set

PREPU Chapter 21: Nursing Management of Labor and Birth at Risk

View Set

Marketing-Midterm Review Fall2018

View Set

Cultural Awareness - Saunders Quiz 1

View Set

P&C Chapter 14 - Workers' Compensation Insurance

View Set

Consolidated Statements (Exam 1)

View Set