Module 2
The _______ in the command syntax is called the delimiting character. It is entered before and after the message.
#
To access context-sensitive help, simply enter what at the CLI?
a question mark "?"
How is the privileged EXEC mode access secured on a switch? - enable class - secret class - enable secret class - service password-encryption
enable secret class
Which command enables password authentication for user EXEC mode access on a switch? - enable secret - login - secret - service password-encryption
login
Which IOS mode are you in if the Switch> prompt is displayed? - global configuration mode - interface subconfiguration mode - line console subconfiguration mode - privileged EXEC mode - user EXEC mode
user EXEC mode
This is often referred to as the "view-only" mode.
user exec mode
The most common method for configuring a home router is by using a ________________________.
web browser-based GUI
Two common subconfiguration modes include:
- Line configuration mode - Interface configuration mode
A CLI-based network operating system enables a network technician to do what?
- Use a keyboard to run CLI-based network programs - Use a keyboard to enter text and text-based commands - View output on a monitor
Through a GUI, a PC operating system enables a user to do what?
- Use a mouse to make selections and run programs - Enter text and text-based commands - View output on a monitor
As a security feature, the Cisco IOS software separates management access into the following two command modes:
- User EXEC mode - Privileged EXEC mode
There are several terminal emulation programs you can use to connect to a networking device either by a _____________________ or by an __________________.
-serial connection over a console port - SSH/Telnet connection
Similar to a console connection, the ________ ________ is out-of-band and does not require networking services to be configured or available.
AUX port
This is not predefined; it is a value or variable defined by the user.
Argument
Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection? - Console - Telnet/SSH - Aux
Aux
_____________________ indicates commands and keywords that you enter literally as shown.
Boldface text
_________________ indicate a required element (keyword or argument).
Braces {x}
___________ and ______________ within _______________ indicate a required choice within an optional element. Spaces are used to clearly delineate parts of the command.
Braces, vertical lines, square brackets [x{y | z }]
Using the __________ may provide the network administrator with more precise control and flexibility than using the _________.
CLI, GUI
Which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in? (Choose two.) - CTRL+Z - disable - enable - end - exit
CTRL+Z, end
The family of network operating systems used on many Cisco devices is called the __________________.
Cisco Internetwork Operating System (IOS)
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? - Console - Telnet/SSH - Aux
Console
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch? - Console - Telnet/SSH - Aux
Console
____________________ is the most common LAN technology used today.
Ethernet
Other Cisco operating systems include ____________ , _____________ , ____________.
IOS XE, IOS XR, NX-OS
The structure of an ___________ address is called dotted decimal notation and is represented by four decimal numbers between 0 and 255.
IPv4
The virtual interface lets you remotely manage a switch over a network using ____________ and _________.
IPv4, IPv6
_______________ are not case-sensitive and can be written in either lowercase or uppercase.
IPv6
________________________ are 128 bits in length and written as a string of hexadecimal values. Every four bits is represented by a single hexadecimal digit; for a total of 32 hexadecimal values.
IPv6
Used to configure a switch port or router network interface.
Interface configuration mode
_________________ indicates arguments for which you supply values.
Italic text
This is a specific parameter defined in the operating system.
Keyword
Used to configure console, SSH, Telnet, or AUX access.
Line configuration mode
Where is the general syntax and what is it for this command? Switch>ping 192.168.10.5
Prompt: Switch> Command: ping Space: space Argument: 192.168.10.5
Where is the general syntax and what is it for this command? Switch>show ip protocols
Prompt: Switch> Command: show Space: space Keyword: ip protocols
Name three terminal emulation programs:
PuTTY Tera Term SecureCRT
________________ is volatile memory. It loses all of its content when the device is powered off or restarted.
RAM
RAM
Random Access Memory
_____________________ is an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.
SSH (secure shell)
______________indicate an optional element (keyword or argument).
Square brackets [x]
The default prompt for interface configuration mode is?
Switch(config-if)#
The default prompt for line configuration mode is?
Switch(config-line)#
___________________ is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network.
Telnet
Which access method would be the most appropriate in-band access to the IOS over a network connection? - Console - Telnet/SSH - Aux
Telnet/SSH
____________________ enable remote access using Telnet or SSH to the device. Many Cisco switches support up to 16 of these that are numbered 0 to 15.
Virtual terminal lines (VTY)
To create a banner message of the day on a network device, use the ____________________ global config command.
banner motd # the message of the day #
Which is the command to configure a banner to be displayed when connecting to a switch? - banner $ Keep out $ - banner motd $ Keep out $ - display $ Keep out $ - login banner $ Keep out $
banner motd $ Keep out $
Groups of four hexadecimal digits are separated by a _______________.
colon (:)
The user can interact with the shell using a ___________ or a ______________.
command-line interface (CLI) graphical user interface (GUI)
From the privileged EXEC mode access the global configuration mode by entering the ___________________ command.
configure terminal
To move in and out of global configuration mode, use the __________ _____________ privileged EXEC mode command.
configure terminal
This is a physical management port that provides out-of-band access to a Cisco device.
console
A computer running terminal emulation software and a special console cable to connect to the device are required for a __________________________.
console connection
To save changes made to the running configuration to the startup configuration file, use the ________________________________ privileged EXEC mode command.
copy running-config startup-config
The __________________ is the IP address of the router that the host will use to access remote networks, including the internet.
default gateway address
Use the __________ privileged EXEC mode command to return to user EXEC mode.
disable
Privileged EXEC mode is sometimes called ______________ mode.
enable
To move from user EXEC mode to privileged EXEC mode, use the ______________ command.
enable
To secure privileged EXEC access, use the ___________________ password global config command.
enable secret
Secure privileged EXEC mode access.
enable secret "password"
To move from any subconfiguration mode to the privileged EXEC mode, enter the _______ command or enter the key combination ____________.
end, Ctrl+Z
The startup config is removed by using the _____________________ privileged EXEC mode command.
erase startup-config
The move from any subconfiguration mode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the ________ command.
exit
To return to the privileged EXEC mode, enter the ________ global config mode command.
exit
The operating system on home routers is usually called ____________.
firmware
Which IOS mode are you in if the Switch(config)# prompt is displayed? - global configuration mode - interface subconfiguration mode - line console subconfiguration mode - privileged EXEC mode - user EXEC mode
global configuration mode
The physical part of a computer including underlying electronics.
hardware
From global configuration mode, enter the command _________________ followed by the name of the switch and press enter.
hostname
What is the command to assign the name "Sw-Floor-2" to a switch? - hostname Sw-Floor-2 - host name Sw-Floor-2 - name Sw-Floor-2
hostname Sw-Floor-2
What is the command to enter VLAN 1 interface subconfiguration mode?
interface vlan 1
____________________ indicate arguments for which you supply values.
italics
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
kernel
The portion of the OS that interacts directly with computer hardware is known as the __________________.
kernel
Some devices, such as routers, may support a _________ ____________ __________ that was used to establish a CLI session remotely over a telephone connection using a modem.
legacy auxiliary port
To enter line subconfiguration mode, you use the _________ command followed by the management line type and number you wish to access.
line Example: Switch(config)# line console 0 Switch(config-line)# exit Switch(config)#
To secure user EXEC mode access, enter line console configuration mode using the _____________________________ global configuration command.
line console 0
What is the command to enter line subconfiguration mode?
line console 0
To secure VTY lines, enter line VTY mode using the ______________________ global config command.
line vty 0 15
What is the command to enter VTY line subconfiguration mode?
line vty 0 15
Enable user EXEC access using the ___________ command.
login
When naming a switch, to return the switch to the default prompt use the ______________________ global config command.
no hostname
______________________ refers to access via a dedicated management channel that is used for device management purposes only.
out-of-band access
Which IOS mode allows access to all commands and features? - global configuration mode - interface subconfiguration mode - line console subconfiguration mode - privileged EXEC mode - user EXEC mode
privileged EXEC mode
What is the general syntax for a switch command?
prompt, command, space, & keyword or arguments
Remove the changed commands individually, or reload the device using the ______________ privileged EXEC mode command to restore the startup-config.
reload
This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a __________________________ affects the operation of a Cisco device immediately.
running-config
SSH
secure shell
Encrypt all plaintext passwords.
service password-encryption
To encrypt all plaintext passwords, use the _______________________ global config command.
service password-encryption
Which command encrypts all plaintext passwords access on a switch? - enable secret - login - secret - service password-encryption
service password-encryption
The portion that interfaces with applications and the user is known as the _____________.
shell
The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.
shell
The ______________________ privileged EXEC mode command is used to view the running config.
show running-config
Use the __________________________ command to verify that passwords are now encrypted.
show running-config
To view the startup configuration file, use the __________________ privileged EXEC command.
show startup-config
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.
startup-config
There are two system files that store the device configuration:
startup-config running-config
An IPv4 ______________________ is a 32-bit value that differentiates the network portion of the address from the host portion.
subnet mask
Cisco IOS Layer 2 switches have physical ports for devices to connect. These ports do not support Layer 3 IP addresses. Therefore , Switches have one or more _____________________.
switch virtual interfaces (SVIs)
Unlike SSH, _______________ does not provide a secure, encrypted connection and should only be used in a lab environment.
telnet