network fundamentals ch 2

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which functionality is provided by DHCP

automatic assignment of an IP address to each host

Which is the command to configure a banner to be displayed when connecting to a switch?

banner motd $ keepout$

Configuration files

can also be saved and archived to a text document. This sequence of steps ensures that a working copy of the configuration file is available for editing or reuse later.

kernel

communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements

Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured?

console

Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch?

console

IOS has two forms of help available

context-sensitive help and command syntax check.

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)

displaying a list of all available commands within the current mode determining with option. keyword or arguments is available for the entered command

What is the structure of an IPv4 address called?

dotted decimal format

To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?

10.1.0.0

Password Guidelines

use of weak or easily guessed passwords continues to be the biggest security concern of organizations. Network devices, including home wireless routers, should always have passwords configured to limit administrative access.

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?

user EXEC mode

which IOS mode are you in if the swith > prompt is displayed

user EXEC mode

Command syntax check

verifies that a valid command was entered by the user.

Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection?

AUX

operating system (OS)

All end devices and network devices require an

[x {y | z }]

Braces and vertical lines within square brackets indicate a required choice within an optional element. Spaces are used to clearly delineate parts of the command.

{x}

Braces indicate a required element (keyword or argument)

which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in? (Choose two.)

CTRL+Z end

Examples of end devices include these:

Computers (work stations, laptops, file servers, web servers) Network printers VoIP phones Security cameras Smart phones Mobile handheld devices (such as wireless barcode scanners)

which IOS mode allows access to all commands and features

privileged EXEC mode

various types of media:

Distance the media can successfully carry a signal Environment in which the media is to be installed Amount of data and the speed at which it must be transmitted Cost of the media and installation

show running-config

privileged EXEC mode command is used to view the running config.

Two common subconfiguration modes include:

Line Configuration Mode Interface Configuration Mode

Privileged EXEC Mode command mode

Mode allows access to all commands and features. The user can use any monitoring commands and execute configuration and management commands. Switch# Router#

User Exec Mode

Mode allows access to only a limited number of basic monitoring commands. It is often referred to as "view-only" mode. Switch> Router>

Which memory location on a Cisco router or switch stores the startup configuration file

NVRAM

which memory location on a cisco router or switch will lose all content when the device is restarted

RAM

Secure Shell (SSH)

SSH is an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network. Unlike a console connection, SSH connections require active networking services on the device, including an active interface configured with an address. Most versions of Cisco IOS include an SSH server and an SSH client that can be used to establish SSH sessions with other devices.

[x]

Square brackets indicate an optional element (keyword or argument).

Why would a technician enter the command copy startup-config running-config?

to copy an existing configuration into RAM

ping ip-address

The command is ping and the user-defined argument is the ip-address of the destination device. For example, ping 10.10.10.5.

traceroute ip-address

The command is traceroute and the user-defined argument is the ip-address of the destination device. For example, traceroute 192.168.254.254.

Encrypt Passwords

The startup-config and running-config files display most passwords in plaintext. This is a security threat because anyone can discover the passwords if they have access to these files.

Console

This is a physical management port that provides out-of-band access to a Cisco device. Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only. The advantage of using a console port is that the device is accessible even if no networking services are configured, such as performing the initial configuration. A computer running terminal emulation software and a special console cable to connect to the device are required for a console connection.

keyword

This is a specific parameter defined in the operating system (in the figure, ip protocols).

Argument

This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5)

running-config

This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.

startup-config

This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off

User EXEC Mode

This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device. The user EXEC mode is identified by the CLI prompt that ends with the > symbol.

Privileged EXEC Mode

To execute configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes, like global configuration mode, can only be reached from privileged EXEC mode. The privileged EXEC mode can be identified by the prompt ending with the # symbol

CLI-based network operating system (e.g., the Cisco IOS on a switch or router) enables a network technician to do the following:

Use a keyboard to run CLI-based network programs Use a keyboard to enter text and text-based commands View output on a monitor

PC operating system enables a user to do the following:

Use a mouse to make selections and run programs Enter text and text-based commands View output on a monitor

key points to consider when choosing passwords:

Use passwords that are more than eight characters in length. Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences. Avoid using the same password for all devices. Do not use common words because they are easily guessed.

Interface Configuration Mode

Used to configure a switch port or router network interface.

Line Configuration Mode

Used to configure console, SSH, Telnet, or AUX access.

As a security feature, the Cisco IOS software separates management access into the following two command modes:

User EXEC Mode Privileged EXEC Mode

What is the default SVI on a Cisco switch?

VLAN1

Configure Passwords

When you initially connect to a device, you are in user EXEC mode. This mode is secured using the console.

Context-sensitive help enables you to quickly find answers to these questions:

Which commands are available in each command mode? Which commands start with specific characters or group of characters? Which arguments and keywords are available to particular commands?

How is the privileged EXEC mode access secured on a switch?

enables secret class

How is an IPv4 address represented?

four decimal numbers between 0 and 255 by periods

Which IOS mode are you in if the Switch(config)# prompt is displayed?

global configuration mode

What is the command to assign the name "Sw-Floor-2" to a switch?

hostname SW-Floor-2

Telnet

is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network. Unlike SSH, Telnet does not provide a secure, encrypted connection and should only be used in a lab environment. User authentication, passwords, and commands are sent over the network in plaintext. The best practice is to use SSH instead of Telnet. Cisco IOS includes both a Telnet server and Telnet client.

: Privileged EXEC mode

is sometimes called enable mode.

use of IP addresses

is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet. Each end device on a network must be configured with an IP address.

Which statement is true about the running configuration file in a Cisco IOS device?

it affects the operation of the device immediately when modified

What is the function of the shell in an OS?

it interfaces between the users and the kernel

Which command enables password authentication for user EXEC mode access on a switch?

login

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

noting must be done. changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the enter key has been pressed

The following examples demonstrate conventions used to document and use IOS commands:

ping ip address traceroute ip address

Which type of access is secured on a Cisco router or switch with the enable secret command?

privileged EXEC

Which command encrypts all plaintext passwords access on a switch?

service password encryption

two system files that store the device configuration:

startup-config running-config

what How is an IPv4 address represented?

switched virtual interface

Which access method would be the most appropriate in-band access to the IOS over a network connection

telnet/SSH

italics

text indicates arguments for which you supply values

boldface

text indicates commands and keywords that you enter literally as shown.

Which two statements are true regarding the user EXEC mode? (Choose two.)

the device prompt for this mode ends with the ">" symbol only some aspects of the router configuration can be viewed

When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.)

the hostname should be fewer than 64 characters in length the hostname should contain no spaces the hostname should begin with a letter

hardware

the physical part of a computer including underlying electronics

shell

the user interface that allows users to request specific tasks from the computer. these request can be made either through the CLI or GUI interfaces

GUI such as Windows, macOS, Linux KDE, Apple iOS, or Android allows

the user to interact with the system using an environment of graphical icons, menus, and windows


Conjuntos de estudio relacionados

Musculoskeletal pathology knee and hip

View Set

Quizizz- Electric Energy and Currents

View Set

Mythology: Egyptian, Hinduism, Celtic

View Set

Cognitive Psychology UAFS Final Exam

View Set

Chapter 28: Assessment of Hematologic Function and Treatment Modalities

View Set

Chapter 41- Normal Anatomy and Physiology of the Female Pelvis

View Set

BUA 380, Computer 12: Communication in Organization

View Set

medsurg tings 1-73 ATI ADULT MED SURG

View Set

Exam: 03.07 Module Three Review and Practice Exam Geometry

View Set

Ch. 8- Corporate Strategy: Vertical Integration and Diversification

View Set