Network Fundamentals Module 2
Which functionality is provided by DHCP?
automatic assignment of an IP address to each host
Which is the command to configure a banner to be displayed when connecting to a switch?
banner motd $ Keep out $
To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?
10.1.0.0
Why would a technician enter the command copy startup-config running-config?
to copy an existing configuration into RAM
A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display?
user EXEC mode
What is the structure of an IPv4 address called?
dotted-decimal format
Which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in?
- CTRL+z - end
Privileged EXEC Mode
- Mode allows access to all commands and features - The user can use any monitoring commands and execute configuration and management commands (Switch# Router#)
User EXEC Mode
- Mode allows access to only a limited number of basic monitoring commands - It is often referred to as "view-only" mode (Switch> Router>)
Naming guidelines for hosts
- Start with a letter - Contain no spaces - End with a letter or digit - Use only letters, digits, and dashes - Be less than 64 characters in length
Which two statements are true regarding the user EXEC mode?
- The device prompt for this more ends with the ">" symbol - Only some aspects of the router configuration can be viewed
Password guidelines
- Use passwords that are more than eight characters in length - Use a combination of upper and lowercase letters, numbers, special characters, and/or numeric sequences - Avoid using the same password for all devices - Do not use common words because they are easily guessed
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?
- displaying a list of all available commands within the current mode - determining which option, keyword, or argument is available for the entered command
Secure Shell (SSH)
An in-band and recommended method for remotely establishing a secure CLI connection, through virtual interface, over a network.
Telnet
An insecure, in-band method of remotely establishing a CLI session, through a virtual interface over a network. Should only be used in a lab environment.
Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection?
Aux
The Kernel
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured?
Console
Which access method would be most appropriate if your manage gave you a special cable and to you to use it to configure the switch?
Console
Access Methods:
Console Secure shell (SSH) Telnet
Which IOS mode are you in if the Switch(config)# prompt is displayed?
Global configuration mode
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified
What is the function of the shell in an OS?
It interfaces between the users and the kernel.
Which memory location on a Cisco router or switch stores the startup configuration file?
NVRAM
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.
Console
Physical management port that provides out-of-band access to a Cisco device. Advantage is that the device is accessible even if no networking services are configured.
Aux
Port that is out-of-band and does not require networking services to be configured or available.
Which IOS mode allows access to all commands and features?
Privileged EXEC mode
Which memory location on a Cisco router or switch will lose all content when the device is restarted?
RAM
GUI
Such as Windows, macOS, Linux KDE, Apple iOS or Android, allows the user to interact with the system using graphical icons, menus, and windows. Requires less knowledge of command structure.
Which access method would be the most appropriate in-band access to the IOS over a network connection?
Telenet/SSH
Hardware
The physical part of a computer including underlying electronics.
Interface Configuration Mode
Used to configure a switch port or router network interface.
Line Configuration Mode
Used to configure console, SSH, Telnet, or AUX access.
Which IOS mode are you in if the Switch> prompt is displayed?
User EXEC mode
The Shell
User interface that allows users to request specific tasks from the computer. The user can interact with the shell using a command-line interface (CLI) or a graphical user interface (GUI).
What is the default SVI on a Cisco switch?
VLAN1
CLI
When using CLI, the user interacts directly with the system in a text-based environment by entering commands on the keyboard at a command prompt.
How is the privileged EXEC mode access secured on a switch?
enable secret class
How is an IPv4 address represented?
four decimal numbers between 0 and 255 separated by periods.
What is the command to assign the name "Sw-Floor-2" to a switch?
hostname Sw-Floor-2
Which command enables password authentication for user EXEC mode access on a switch?
login
Which type of access is secured on a Cisco router or switch with the enable secret command?
privileged EXEC
Which command encrypts all plaintext passwords access on a switch?
service password-encryption
What type of interface has no physical port associated with it?
switch virtual interface (SVI)