Chapter 2 CCNA
What CLI command keyword will Undo or remove the effects of a command.
"No"
Explain what a switch virtual interface (SVIs) is.
A Switched Virtual Interface (SVI) is a virtual LAN (VLAN) of switch ports represented by one interface to a routing or bridging system. ... By default, an SVI is created for the default VLAN (VLAN1) to permit remote switch administration. An SVI cannot be activated unless associated with a physical port.
Explain why it is important to name all your networking devices.
By choosing names wisely, it is easier to remember, document, and identify network devices
Tab
Completes partially typed command or keyword Exits
Ctrl-Z
Config mode and returns to EXEC.
If you are in global configuration mode on a switch and type exit, Ctrl+Z, or end what will your prompt look like.
Config mode returns to EXEC
Ctrl-C
Ends the configuration mode and returns to privileged EXEC mode.
If you are in privileged EXEC mode on a router and type exit what will your prompt be?
Global Configuration
Which CLI mode is designed to allow a technician to configure settings on the device that affect the device as a whole?
Global Configuration Mode
Ctrl-Shift-6
Interrupts an IOS process
Why is SSH a better choice than telnet to access the CLI?
It establishes a secure CLI connection as compared to telnet which establishes an insecure connection.
If the command was: Switch(config)# line vty 0 4 What would this indicate
It is enabling remote access to the device
What is the purpose of a subnet IPv4?
Its the value that separates the network portion of the address from the host portion.
What commands are required to install a password on a routers console part?
Line Console0 <password> Login in prompt
Where is the startup configuration stored?
NVRAM
Where is the running configuration file stored while in use?
NVRAM and RAM
What does Enable Password do?
Protects configuration
What does Console Password do?
Protects console interface
Why are banners important?
Provides a method for declaring that only authorized personnel should attempt to gain entry into the device
Up Arrow
Scroll forward through former commands
What does Enable Secret do?
Secure Privilege Exec mode
What is the default switch Privileged EXEC mode prompt?
Switch# Router#
What is the command to move the device from privileged EXEC mode to global configuration mode?
Switch# configure terminal
What is the default router global configuration mode prompt?
Switch(config)#
What is the default router user EXEC mode prompt?
Switch> Router>
What command is used to enter Privileged EXEC Mode from the User EXEC mode?
Switch> enable
Explain the banner motd delimiting character?
The "#" in the command syntax is called the delimiting character. It is entered before and after the message.
What is the advantage of using a console port?
The advantage of using a console port is that the device is accessible even if no networking services have been configured, such as when performing an initial configuration of the networking device.
What will the command: Switch(config)# service password-encryption do?
The command applies weak encryption to all unencrypted passwords.
What is the running configuration?
The file stored in Random Access Memory (RAM) that reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
What is the startup configuration file?
The startup configuration file reflects the configuration that will be used by the device upon reboot. The startup configuration file is stored in NVRAM.
What is a virtual interface?
Used to navigate to the interface configuration mode from the global configuration mode.
What does VTY password do?
Virtual teletype (VTY) is a command line interface (CLI) created in a router and used to facilitate a connection to the daemon via Telnet, a network protocol used in local area networks. To connect to a VTY, users must present a valid password.
Explain what Cisco Internetwork Operating System (IOS) refers to?
a generic term for the collection of network operating systems used by Cisco networking devices
What are the three most common ways to access the CLI?
a. Console b.Secure Shell (SSH) c.Telnet *d.Auxiliary
A user can interact with the shell using either of two methods. List and explain each.
a.CLI- The user interacts directly with the system in a text based environment by entering commands of the keyboard at a command prompt b.GUI- Allow users to interact through graphical icons
When a command returns more output than can be displaued on a single screen, the "More" prompt appears at the bottom of the screen. List two keyboard options you can use to continue the output on the screen
a.Enter Key b.Space Bar
List the terminal emulation programs shown in the curriculum.
a.PuTTY b.Tera Term c.SecureCRT d.OS X Terminal
The operating system involves three areas. List and explain each.
a.Shell- The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces b.Kernel- Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements c.Hardware- The physical part of a computer including underlying electronics
What are the recommended guidelines for naming conventions?
a.Start with a letter b.Contain no spaces c.End with a letter or digit d.Use only letters, digits, and dashes e.Be less than 64 characters in length
In hierarchical order from most basic to most specialized, list the major CLI modes
a.User Exec Mode b.Privileged EXEC Mode c.Line Configuration Mode d.Interface Configuration Mode
List and explain the two primary CLI modes of operation.
a.User Exec Mode- Mode allows access to only a limited number of basic monitoring commands. It is often refereed to as "view-only" mode. b.Privileged EXEC Mode- Mode allows access to all commands and features. The user can use any monitoring commands and execute configuration and management commands.
What is required to remotely access a switch SVI?
a.config address b.config subnet mask
What are the differences between the various types of media?
a.distance the media can successfully carry a signal b.environment in which the media is to be installed c.amount of data and the speed at which it must be transmitted d.cost of the media and installation
What commands are necessary to delete the startup configuration file on a router or switch and return it to its factory default settings
a.reload b.erase config startup
What does DHCP do?
automatically assigns IP addresses to end devices
What is the purpose of using the "Switch> show ip interface brief" command on a switch or router
command provides a quick status of the interfaces on the router, including their IP address, Layer 2 status, and Layer 3 status
What is the purpose of "0 15" in this example: Switch(config)# line vty 0 15 Switch(config) password cisco Switch(config)# login
meant to secure VTY lines use for SSH and Telnet
What is a console port?
provides out-of-band access to a Cisco device
What are the options that are available after making changes to the running configuration?
show startup-config copy running-config startup-config show running-config