Chapter 6,8,9 Review
Port Security
A Cisco switch feature in which the switch watches Ethernet frames that come in an interface (a port), tracks the source MAC addresses of all such frames, and takes a security action if the number of different such MAC addresses is exceeded.
Secure Shell (SSH)
A UNIX-based command interface and protocol for securely accessing a remote computer.
Log Message
A message generated by any computer, but including Cisco routers and switches, for which the device OS wants to notify the owner or administrator of the device about some event.
Octopus
A new switch is turned on, and the following commands are typed in at the console: configure terminal hostname daveyjones enable password jellyfish enable secret urchin banner motd #Welcome to the Switch# line console 0 login password octopus line vty 0 4 password sharks login line vty 5 15 password sharks login exit exit What is the password you would need to login to the switch on the console?
urchin
A new switch is turned on, and the following commands are typed in at the console: configure terminal hostname daveyjones enable password jellyfish enable secret urchin banner motd #Welcome to the Switch# line console 0 login password octopus line vty 0 4 password sharks login line vty 5 15 password sharks login exit exit What password would the user be required to type in order to enter enable mode?
enable mode
A part of the Cisco IOS CLI in which the user can use the most powerful and potentially disruptive commands on a router or switch, including the ability to then reach configuration mode and reconfigure the router.
configuration mode
A part of the Cisco IOS Software CLI in which the user can type configuration commands that are then added to the device's currently used configuration file (running-config).
10/100/1000
A short reference to an Ethernet NIC or switch port that supports speeds of 10 Mbps, 100 Mbps, and 1000 Mbps (that is, 1 Gbps).
Enable Secret
Imagine that you have configured the enable secret command, followed by the enable password command, from the console. You log out of the switch and log back in at the console. Which command defines the password that you had to enter to access privileged mode? enable password enable secret Neither The password command, if it's configured.
startup-config file
In Cisco IOS switches and routers, the name of the file that resides in NVRAM memory, holding the device's configuration that will be loaded into RAM as the running-config file when the device is next reloaded or powered on.
User Mode
In Windows, a mode that provides an interface between an application and the OS, and only has access to hardware resources through the code running in kernel mode.
history buffer
In a Cisco router or switch, the function by which IOS keeps a list of commands that the user has used in this login session, both in EXEC mode and configuration mode. The user can then recall these commands for easier repeating or making small edits and issuing similar commands.
Default Gateway
In a TCP/IP network, the nearest router to a particular host. This router's IP address is part of the necessary TCP/IP configuration for communicating with multiple networks using IP.
Global Configuration Mode
In which of the following modes of the CLI could you change the hostname of the switch? Global Configuration Mode Enable Mode Interface Configuration Mode User Mode
Enable Mode
In which of the following modes of the CLI could you issue a command to reboot the switch? User Mode Enable Mode Global Configuration Mode Interface Configuration Mode
Running-config file
The name of the file that resides in RAM memory, holding the device's currently used configuration.
name resolution
The process of associating a character-based name with an IP address.
Command-line interface
User interface for an OS devoid of all graphical trappings.
Enable Secret Fred
Which of the following commands would create an md5 hash value of "fred" in the configuration file that a switch administrator would be required to enter in order to get into enable mode? enable secret fred enable password fred enable encrypted fred enable md5 fred
Protect, Restrict, and Shutdown
Which port security options discard the offending traffic? (Choose three) Protect Restrict Shutdown Arrest
telnet
a network protocol that provides a command-line interface to communicate with a device.