CIS 3580 - Chapter 2 Study Guide
What is a GUI?
- A GUI allows the user to interact with the system using an environment of graphical icons, menus, and windows. - A GUI is more user-friendly and requires less knowledge of the underlying command structure that controls the system.
What are the three methods of accessing the IOS command line interface?
- Console - Secure Shell (SSH) - Telnet
What are the differences between various types of media?
- Different types of network media have different features and benefits. Some of the differences between various types of media include: - Distance the media can successfully carry a signal - Environment in which the media is to be installed - Amount of data and the speed at which it must be transmitted - Cost of the media and installation
What are the two most common sub configuration modes and for what purpose are they used?
- Line configuration mode: Used to configure console, SSH, Telnet, or AUX access - Interface configuration mode: Used to configure a switch port or router network interface (54)
What are the three components of an operating system?
- Shell - Kernel - Hardware
what does the three components of an operating system do?
- Shell: The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces. - Kernel: Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements. - Hardware: The physical part of a computer including underlying electronics.
What characterizes and determines strong passwords?
- Use passwords that are more than eight characters in length. - Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences. - Avoid using the same password for all devices. - Do not use common words because they are easily guessed.
What are the main IOS modes (describe), and which do you enter first when you access the CLI?
- User exec mode: allows access to only a limited number of basic monitoring commands, - Privileged exec mode: allows access to all commands and features. - Global configuration mode: used to access configuration options on the device. - Line configuration mode: used to configure console, SSH, Telnet, or Aux access. - Interface Configuration mode:
What are three popular terminal emulation programs?
- as PuTTY - Tera Term - SecureCRT
How do you know which IOS mode you are working in (symbols, (config), etc...)?
> symbol means you are in User EXEC Mode and # symbol means you are in Privileged EXEC Mode.
Which functionality is provided by DHCP? A) Automatic assignment of an IP address to each host B) Remote switch management C) Translation of IP addresses to domain names D) End-to-end connectivity test
A A server using DHCP can be used to automatically assign IP address information to a host
Which Statement is true about the running configuration file in a Cisco IOS device? A) it affects the operation of the device immediately when modified B) It is stored in NVRAM C) It should be deleted using the erase running-config command D) It is automatically saved when the router reboots
A The running configuration file reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately
What is the default SVI on a Cisco Switch? A) VLAN 1 B) VLAN 99 C) VLAN 100 D) VLAN 999
A VLAN 1 is not a physical interface but a virtual one. VLAN 1 is a default VLAN on a Cisco Switch
IPv6 address
A 126-bit address written in hexadecimal used by the IPv6 protocol. IPv6 addresses are the successor of IPv4 addresses
IPv4 address
A 32-bit number, written in dotted decimal notation, used by the IPv4 protocol to uniquely identify an interface connected to an IP network. It is also used as a destination address in an IP header to allow routing. As a source address, it enables a computer to receive a packet and to know to which IP address a response should be sent.
What do network operating systems enable users to do through a GUI?
A GUI allows the user to interact with the system using an environment of graphical icons, menus, and windows.
Traceroute
A command on many computer operating systems that discovers the IP addresses and possibly hostnames of the routers used by the network when sending a packet from one computer to another
Subnet Mask
A dotted decimal number that helps identify the structure of IP addresses. The mask represents the network and subnet parts of related IP addresses with binary 1s and the host part of related IP addresses with binary 0s.
Cisco Internetwork Operating System (IOS)
A generic term for the collection of network operating systems used on Cisco networking devices.
Global Configuration Mode
A mode used to configure global parameters or enter other configuration submodes, such as interface, router, and line configuration sub-models
Telnet
A non-secure application that supports CLI access to a remote host. It also can be used to verify the application layer software between source and destination stations.
Secure Shell (SSH)
A protocol that provides a secure remote connection to a host through a TCP application.
Dynamic Host Configuration Protocol (DHCP)
A protocol used to dynamically assign IP configurations to hosts. The services defined by the protocol are used to request snd assign an IP address, a default gateway, and a DNS server address to a network host.
Ping
A troubleshooting tool used to verify network connectivity by sending a packet to a specific IP address and waiting for the reply.
Command Line Interface (CLI)
A user interface to a computer operating system or application that depends on the textual command being entered by the user
Graphical User Interface (GUI)
A user interface which displays images and widgets, along with text, to indicate the information and actions available to a user when interacting with a computer
Switch Virtual Interface (SVI)
A virtual interface for which there is no associated physical hardware on the device. An SVI is created in software. The virtual interfaces are used as a means to remotely manage a switch over a network. They are also used for routing between VLANs
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines? (Choose three.) A) The host name should be fewer than 64 characters in length B) The host name should be written in all lowercase characters C) The host name should contain no spaces D) The host name should end with a special Character E) The host name should begin with a letter
A, C, and E The guidelines for configuring a hostname are: - Start with a letter - Include no spaces - End with a letter or digit - Use only letters, digits, and dashes - Be fewer than 64 characters in length
Name at least one advantage and disadvantage of a CLI interface?
Advantage: - Use a keyboard to run CLI-based network programs - Use a keyboard to enter text and text-based commands - View output on monitor - GUIs may not always provide all the features available with the CLI - Less resource intensive and very stable compared to a GUI Disadvantage: - Not as user friendly - Can't use a mouse to make selections and run programs - Can't text and text-based commands
What are the important guidelines for naming routers and switches?
All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and remote Telnet access with passwords. In addition, all passwords should be encrypted and legal notifications provided.
Random Access Memory (RAM)
Also known as read/write memory, memory that can have new data written to it and that can have stored data read from it. RAM is the main working area, or temporary storage, used by a CPU for most processing and operations. A drawback of RAM is that it requires electrical power to maintain storage. If the computer is turned off or loses power, all data stored in RAM is lost unless the data was previously saved to the disk. Memory boards with RAM chips plug into the motherboard
What must each end device have to communicate on a network?
An IP Address
Describe a IPv4 subnet mask.
An IPv4 subnet mask is a 32-bit value that differentiates the network portion of the address from the host portion.
Domain Name System (DNS)
An internet-wide system by which a hierarchical set of DNS servers collectively hold all the name-to-IP address mappings, and DNS servers refer users to the correct DNS server to successfully resolve a DNS name.
Which type of access is secured on a Cisco router or switch with the enable secret command? A) Virtual terminal B) Privileged EXEC C) AUX port D) Console line
B Higher configuration modes, such as global configuration mode, can only be reached from privileged EXEC mode. When this mode is configured, the enable secret password is required to enter privileged EXEC mode.
What is the function of the shell in an OS? A) It interacts with the device hardware B) It interfaces between the users and the kernel C) it provides dedicated firewall services D) It provides intrusion protection services for the device
B The portion of the OS that interacts directly with computer hardware is known as the kernel
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.) A) Providing an error message when an incorrect command is submitted B) Displaying a list of all commands available in the current mode C) Allowing the user to complete the remainder of an abbreviated command with the Tab Key D) Determining which option, keyword, or argument is available for the entered command E) Selecting the best command to accomplish a task
B and D Contect-sensitive help provides: - Commands available in each command mode - Commands that start with specific characters or group of characters - Arguments and keywords that are available to particular commands
Why would a technician enter the command copy startup-config running-config? A) To remove all configurations from the switch B) To save an active configuration to NVRAM C) To copy an existing configuration into RAM D) To make a changed configuration the new startup configuration
C The command copy startup-config running-config copies the startup configuration file from NVRAM into the running configuration file in RAM
Which memory location on a Cisco router stores the startup configuration file? A) RAM B) ROM C) NVRAM D) Flash
C The startup configuration file on a router is stored in NCRAM and retains information when power is lost
Which two statements are true regarding user EXEC mode? (Choose two) A) All router commands are available B) Global configuration mode can be accessed by entering the enable command C) The Device prompt for this mode ends with the > symbol D) Interfaces and routing protocols can be configured E) Only some aspects of the router configuration can be viewd
C and E User EXEC mode has a limited capabilities, nut it is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device. User EXEC mode is identified by the CLI prompt that ends with the > symbol
Which access method needs a physical connection in order to access network components?
Console
What are the two forms of help available with IOS?
Context-sensitive and command syntax check
Which memory location on a Cisco router or switch loses all content when the device is restarted? A) ROM B) Flash C) NVRAM D) RAM
D RAM is volatile memory and loses all information when the device is restricted
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device? A) Copy the running configuration to the startup configuration file B) Copy the information in the startup configuration file to the running configuration C) reload the device and type yes when prompted to save the configuration D) Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed
D Most commands entered in IOS take effect immediately, including the configuration of an IP address on and interface
A switch with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no line console 0 password. When the router boots up, which mode will display? A) Global configuration mode B) Setup mode C) Privileged EXEC mode D) User EXEC Mode
D The switch will boot up in user EXEC mode. Without a console password previously set on the switch, the user will be in user EXEC mode
How would I declare that only authorized personnel have access to a switch or router in IOS?
Enable secret password global config command (64)
You know that there is a show (help) command that will show you the contents of the routing table, but you cannot remember which show command it is. What should you do?
Enter a "?" after what you do know to provide a help menu (pg. 58)
What is the most common type LAN technology used today?
Ethernet
How are IPv6 addresses represented?
Every four bits is represented by a single hexadecimal digit; for a total of 32 hexadecimal values. Groups of four hexadecimal digits are separated by a colon ":".
User EXEC Mode
Has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands and does not allow the execution of any commands that might change the configuration pf the device. it is identified by the CLI prompt that ends with the > symbol
What is an IPv6 address and how is it different than IPv4 addresses?
IPv6 addresses are 128 bits in length and written as a string of hexadecimal values.
Are IPv6 addresses case sensitive?
IPv6 addresses are not case-sensitive and can be written in either lowercase or uppercase.
Why do most users rely on a GUI environment?
Is more user friendly and requires less knowledge of the underlying command structure that controls the system.
A dotted-decimal notation indicates what?
It is represented by four decimal numbers between 0 and 255
Virtual Terminal (VTY)
Lines enable remote access using Telnet or SSH to the device
Firmware
Permanent software programmed into ROM memory
Nonvolatile Random Access Memory (NVRAM)
RAM that does not lose its contents when the device is powered down
How are IPv4 addresses represented?
Represented by four decimal numbers between 0 and 255.
What is the prompt in privileged exec mode if the router's name is Athens?
Router#Athens
How would I access a device with a secured connection?
Secure Shell
How would I check to determine if a password is encrypted in IOS?
Show running-config (65)
What command would you enter in order to go to global configuration mode?
Switch(config)#
What is the prompt in global configuration mode if the router's name is Athens?
Switch(config)#Athens
How would I access a device with an unsecured connection?
Telnet
What command exits the current configuration mode and returns to EXEC mode?
The END command
What command exits the current configuration mode and returns to the previous configuration mode?
The EXIT command
The IP address of the router that hosts will use to access remote networks is called?
The default gateway
What two components make up the command structure syntax?
The keyword and the argument
Shell
The portion of OS that interfaces with applications and the user
Kernel
The portion of the OS that interacts directly with computer hardware
What is the primary means of enabling devices to locate one another and establish end-to-end communications on the internet?
The use of IP addresses
Why should each router and switch have a unique descriptive hostname?
The use of weak or easily guessed passwords are a security concern.
What programs are used to connect to network devices and allow for enhancing productivity or changing fonts?
There are several terminal emulation programs you can use to connect to a networking device either with a serial connection over a console port or with an SSH/Telnet connection.
Console
This is the physical management port that provides out-of-band access to a Cisco Device. The advantage of using a console port is that the device is accessible even if no networking services are configured, such as when performing the initial configuration. A console connection requires a computer running terminal emulation software and a special console cable to connect the device.
Privileged EXEC Mode
To execute configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes, such as global configuration mode, can be reached from privileged EXEC mode. Can be identified by the prompt ending with the # symbol.
Coupled with IPv4 addressing, subnet mask determines what?
To which subnet the device is a member of.
You have to physically connect to do the first configuration, security is why you have to be there in person.
True
What do CLI based operating systems allow technicians to do?
Use a keyboard to run CLI-based network programs, Use a keyboard to enter text and text-based commands, and View output on a monitor
What tool allows you to set the length, character set and other parameters of strong generated passwords?
Use an internet search to find a password generator (63)
What are the two primary command modes for management access in network components?
User EXEC Mode and Privileged Mode
When would you have to use the console port rather than Telnet?
When providing maintenance, such as performing initial configurations.
On what are network communications dependent?
Yes, they depend on end user device interfaces, networking device interfaces, and the cables that connect them.
What is the purpose of a CLI?
based network operating system enables a network technician to do the following: Use a keyboard to run CLI-based network programs, Use a keyboard to enter text and text-based commands, and View output on a monitor