Network

¡Supera tus tareas y exámenes ahora con Quizwiz!

Which command or key combination allows a user to return to the previous level in the command hierarchy?

exit

The operating system on home routers is usually called __________.

firmware

The portion that interfaces with applications and the user is known as the __________.

shell

By connecting two PCs to a __________, those PCs will instantly have connectivity with one another.

switch

Completes abbreviated commands and parameters

tab

There are a number of excellent __________ available for connecting to a networking device either by a serial connection over a console port or by a SSH/Telnet connection.

terminal emulation programs

Refer to the exhibit. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?

to display a message when a user accesses the switch

Provides context sensitive help

?

What is a result of using the service password-encryption command on a Cisco network device?

All passwords in the configuration are not shown in clear text when viewing the configuration.

The __________ is less resource intensive and very stable when compared to a __________.

CLI; GUI

This is a physical management port that provides out-of-band access to a Cisco device.

Console

Aborts commands such as trace and ping

Ctrl-Shift-6

What criterion must be followed in the design of an IPv4 addressing scheme for end devices?

Each IP address must be unique within the local network.

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured?

Exit privileged EXEC mode and press Enter.

Which two features are characteristics of flash memory?

Flash provides nonvolatile storage; The contents of flash may be overwritten

What benefit does DHCP provide to a network?

Hosts can connect to the network and get an IP address without manual configuration.

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?

Issue the reload command without saving the running configuration.

Which statement is true about the running configuration file in a Cisco IOS device?

It affects the operation of the device immediately when modified.

virtual interface

It allows access throught use of Telnet or SSH protocols; It requires an active network connection.

AUX port

It connects through dialup connections; It is not supported on Catalyst switch devices

console port

It displays startup, debugging, and error messages by default; It can be used to restore an out-of-box configuration on a switch or router

How does the service password-encryption command enhance password security on Cisco routers and switches?

It encrypts passwords that are stored in router or switch configuration files.

Which two characters are allowed as part of the hostname of a Cisco device?

Numbers and dashes

__________ refers to access via a dedicated management channel that is used for device maintenance purposes only.

Out-of-band access

Higher configuration modes, like global configuration mode, can only be reached from this mode.

Privileged EXEC Mode

This mode can be identified by the prompt ending with the # symbol (Switch# Router#).

Privileged EXEC Mode

To execute configuration commands, a network administrator must access this mode.

Privileged EXEC Mode

An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered? (Not all options are used.)

Privileged EXEC Mode- Second Mode Line Configuration Mode- Final Mode Global Configuration Mode- Third Mode User EXEC Mode- First Mode

Some of terminal emulation programs include:

PuTTY; Tera Term; SecureCRT; OS X Terminal

Which two host names follow the guidelines for naming conventions on Cisco IOS devices?

RM-3-Switch-2A4 and SwBranch799

Unlike __________, __________ does not provide a securely encrypted connection. User authentication, passwords, and commands are sent over the network in plaintext.

SSH; Telnet

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?

Secure Shell (SSH)

__________ is a method for remotely establishing a secure CLI connection through a virtual interface, over a network.

Secure shell (SSH)

Displays the next screen

Space bar

_________ is an insecure method of remotely establishing a CLI session through a virtual interface, over a network.

Telnet

__________ allow you to enhance your productivity by adjusting window sizes, changing font sizes, and changing color schemes.

Terminal emulation programs

A technician is adding a new PC to a LAN. After unpacking the components and making all the connections, the technician starts the PC. After the OS loads, the technician opens a browser, and verifies that the PC can reach the Internet. Why was the PC able to connect to the network with no additional configuration?

The PC was preconfigured to use DHCP.

What are two characteristics of RAM on a Cisco device?

The configuration that is actively running on the device is stored in RAM; The contents of RAM are lost during a power cycle.

Which information does the show startup-config command display?

The contents of the saved configuration file in NVRAM

What is the function of the kernel of an operating software?

The kernel provisions hardware resources to meet software requirements.

Refer to the exhibit. A switch was configured as shown. A ping to the default gateway was issued, but the ping was not successful. Other switches in the same network can ping this gateway. What is a possible reason for this?

The no shutdown command was not issued for VLAN 1.

Refer to the exhibit. What three facts can be determined from the viewable output of the show ip interface brief command?

The switch can be remotely managed; One device is attached to a physical interface; The default SVI has been configured.

Which interface allows remote management of a Layer 2 switch?

The switch virtual interface

Why would a Layer 2 switch need an IP address?

To enable the switch to be managed remotely

Why is it important to configure a hostname on a device?

To identify the device during remote access (Telnet/SSH)

Scrolls backwards through previously entered commands

Up arrow

A CLI-based network operating system like the Cisco IOS on a switch or router enables a network technician to:

Use a keyboard to run CLI-based network programs; Use a keyboard to enter text and text-based commands; View output on a monitor

Through a GUI, a PC operating system enables a user to:

Use a mouse to make selections and run programs; Enter text and text-based commands; View output on a monitor

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment?

Use the console port to locally access the switch from a serial or USB interface of the PC

A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?

User EXEC Mode

A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display?

User EXEC Mode

This mode allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device.

User EXEC Mode

This mode has limited capabilities but is useful for basic operations.

User EXEC Mode

This mode is identified by the CLI prompt that ends with the > symbol (Switch> Router>).

User EXEC Mode

As a security feature, the Cisco IOS software separates management access into the following two primary command modes:

User EXEC Mode; Privileged EXEC Mode

Which interface is the default SVI on a Cisco switch?

VLAN 1

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.)

VTY interface; console interface; privileged EXEC mode

A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade?

What models of routers and switches require upgrades? Do the routers and switches have enough RAM and flash memory for the proposed IOS versions? What features are required for the devices?

The user can interact with the shell using a __________ or a __________.

command-line interface (CLI); graphical user interface (GUI)

Even though a Cisco switch will function immediately, __________ is a recommended best practice.

configuring initial settings

Refer to the exhibit. A network technician is testing connectivity in a new network. Based on the test results shown in the exhibit, which device does the technician have connectivity with and which device does the technician not have connectivity with?

connectivity: switch 2; no connectivity: PC-C

To initially configure a Cisco device, a __________ must be established.

console connection

There are several ways to access the CLI environment and configure the Cisco switch. The most common methods are:

console, secure shell (SSH), and telnet

Unlike a __________ connection, __________ connections require active networking services on the device including an active interface configured with an address.

console; SSH

A network operating system enables __________ to function and provides a(n) __________ for users to interact.

device hardware; interface

Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?

displaying a list of all available commands within the current mode; determining which option, keyword, or argument is available for the entered command

The Cisco IOS modes use a __________ and are quite similar for both switches and routers.

hierarchical structure

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC?

if there is connectivity with the destination device

What command can be used on a Windows PC to see the IP configuration of that computer?

ipconfig

The portion of the OS that interacts directly with computer hardware is known as the __________.

kernel

Some devices, such as routers, may also support a __________ that was used to establish a CLI session remotely using a modem. Similar to a console connection, the __________ is out-of-band and does not require networking services to be configured or available.

legacy auxiliary port; AUX port

These network devices use an operating system called a __________.

network operating system

Every computer requires a(n) __________ to function, including computer-based network devices such as switches, routers, access points, and firewalls.

operating system

Once consoled in, the network technician will have to navigate through __________.

various command modes of the IOS CLI


Conjuntos de estudio relacionados

Physics Practice Questions - Quiz- Heat

View Set

MSN 377: Ch 70 Workbook Questions

View Set

Early Beliefs About the Origin of Life

View Set

Legal Environment of Business (MindTap) 8-11 & 23

View Set

Chapter 8- Wireless, Mobile Computing & Mobile Commerce

View Set

Ch. 1: About Strategy (Strategic Management 4e, Rothaermel) 2.0

View Set

AP Biology Unit 1: Chemistry of Life Test

View Set

Chapter 4: Linux File System Management (combined)

View Set

Responsibilities of Cybersecurity Roles

View Set