Chapter 6,8,9 Review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Port Security

A Cisco switch feature in which the switch watches Ethernet frames that come in an interface (a port), tracks the source MAC addresses of all such frames, and takes a security action if the number of different such MAC addresses is exceeded.

Secure Shell (SSH)

A UNIX-based command interface and protocol for securely accessing a remote computer.

Log Message

A message generated by any computer, but including Cisco routers and switches, for which the device OS wants to notify the owner or administrator of the device about some event.

Octopus

A new switch is turned on, and the following commands are typed in at the console: configure terminal hostname daveyjones enable password jellyfish enable secret urchin banner motd #Welcome to the Switch# line console 0 login password octopus line vty 0 4 password sharks login line vty 5 15 password sharks login exit exit What is the password you would need to login to the switch on the console?

urchin

A new switch is turned on, and the following commands are typed in at the console: configure terminal hostname daveyjones enable password jellyfish enable secret urchin banner motd #Welcome to the Switch# line console 0 login password octopus line vty 0 4 password sharks login line vty 5 15 password sharks login exit exit What password would the user be required to type in order to enter enable mode?

enable mode

A part of the Cisco IOS CLI in which the user can use the most powerful and potentially disruptive commands on a router or switch, including the ability to then reach configuration mode and reconfigure the router.

configuration mode

A part of the Cisco IOS Software CLI in which the user can type configuration commands that are then added to the device's currently used configuration file (running-config).

10/100/1000

A short reference to an Ethernet NIC or switch port that supports speeds of 10 Mbps, 100 Mbps, and 1000 Mbps (that is, 1 Gbps).

Enable Secret

Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode? enable password enable secret Neither The password command, if it's configured.

startup-config file

In Cisco IOS switches and routers, the name of the file that resides in NVRAM memory, holding the device's configuration that will be loaded into RAM as the running-config file when the device is next reloaded or powered on.

User Mode

In Windows, a mode that provides an interface between an application and the OS, and only has access to hardware resources through the code running in kernel mode.

history buffer

In a Cisco router or switch, the function by which IOS keeps a list of commands that the user has used in this login session, both in EXEC mode and configuration mode. The user can then recall these commands for easier repeating or making small edits and issuing similar commands.

Default Gateway

In a TCP/IP network, the nearest router to a particular host. This router's IP address is part of the necessary TCP/IP configuration for communicating with multiple networks using IP.

Global Configuration Mode

In which of the following modes of the CLI could you change the hostname of the switch? Global Configuration Mode Enable Mode Interface Configuration Mode User Mode

Enable Mode

In which of the following modes of the CLI could you issue a command to reboot the switch? User Mode Enable Mode Global Configuration Mode Interface Configuration Mode

Running-config file

The name of the file that resides in RAM memory, holding the device's currently used configuration.

name resolution

The process of associating a character-based name with an IP address.

Command-line interface

User interface for an OS devoid of all graphical trappings.

Enable Secret Fred

Which of the following commands would create an md5 hash value of "fred" in the configuration file that a switch administrator would be required to enter in order to get into enable mode? enable secret fred enable password fred enable encrypted fred enable md5 fred

Protect, Restrict, and Shutdown

Which port security options discard the offending traffic? (Choose three) Protect Restrict Shutdown Arrest

telnet

a network protocol that provides a command-line interface to communicate with a device.


Set pelajaran terkait

French CSET review questions, french cset

View Set

RHEUMATOLOGY, Orthopedics, Dermatology

View Set

Chapter 7: Introduction to Hypothesis Testing

View Set

2014 NEC Chapter 2 Wiring and Protection

View Set

CW 1.1: Early Tensions Between East and West

View Set

Intermediate Accounting II - Test 2 (Chapter 16, 17 & 18)

View Set