Module 2

Ace your homework & exams now with Quizwiz!

The _______ in the command syntax is called the delimiting character. It is entered before and after the message.

#

To access context-sensitive help, simply enter what at the CLI?

a question mark "?"

How is the privileged EXEC mode access secured on a switch? - enable class - secret class - enable secret class - service password-encryption

enable secret class

Which command enables password authentication for user EXEC mode access on a switch? - enable secret - login - secret - service password-encryption

login

Which IOS mode are you in if the Switch> prompt is displayed? - global configuration mode - interface subconfiguration mode - line console subconfiguration mode - privileged EXEC mode - user EXEC mode

user EXEC mode

This is often referred to as the "view-only" mode.

user exec mode

The most common method for configuring a home router is by using a ________________________.

web browser-based GUI

Two common subconfiguration modes include:

- Line configuration mode - Interface configuration mode

A CLI-based network operating system enables a network technician to do what?

- Use a keyboard to run CLI-based network programs - Use a keyboard to enter text and text-based commands - View output on a monitor

Through a GUI, a PC operating system enables a user to do what?

- Use a mouse to make selections and run programs - Enter text and text-based commands - View output on a monitor

As a security feature, the Cisco IOS software separates management access into the following two command modes:

- User EXEC mode - Privileged EXEC mode

There are several terminal emulation programs you can use to connect to a networking device either by a _____________________ or by an __________________.

-serial connection over a console port - SSH/Telnet connection

Similar to a console connection, the ________ ________ is out-of-band and does not require networking services to be configured or available.

AUX port

This is not predefined; it is a value or variable defined by the user.

Argument

Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection? - Console - Telnet/SSH - Aux

Aux

_____________________ indicates commands and keywords that you enter literally as shown.

Boldface text

_________________ indicate a required element (keyword or argument).

Braces {x}

___________ and ______________ within _______________ indicate a required choice within an optional element. Spaces are used to clearly delineate parts of the command.

Braces, vertical lines, square brackets [x{y | z }]

Using the __________ may provide the network administrator with more precise control and flexibility than using the _________.

CLI, GUI

Which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in? (Choose two.) - CTRL+Z - disable - enable - end - exit

CTRL+Z, end

The family of network operating systems used on many Cisco devices is called the __________________.

Cisco Internetwork Operating System (IOS)

Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? - Console - Telnet/SSH - Aux

Console

Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch? - Console - Telnet/SSH - Aux

Console

____________________ is the most common LAN technology used today.

Ethernet

Other Cisco operating systems include ____________ , _____________ , ____________.

IOS XE, IOS XR, NX-OS

The structure of an ___________ address is called dotted decimal notation and is represented by four decimal numbers between 0 and 255.

IPv4

The virtual interface lets you remotely manage a switch over a network using ____________ and _________.

IPv4, IPv6

_______________ are not case-sensitive and can be written in either lowercase or uppercase.

IPv6

________________________ are 128 bits in length and written as a string of hexadecimal values. Every four bits is represented by a single hexadecimal digit; for a total of 32 hexadecimal values.

IPv6

Used to configure a switch port or router network interface.

Interface configuration mode

_________________ indicates arguments for which you supply values.

Italic text

This is a specific parameter defined in the operating system.

Keyword

Used to configure console, SSH, Telnet, or AUX access.

Line configuration mode

Where is the general syntax and what is it for this command? Switch>ping 192.168.10.5

Prompt: Switch> Command: ping Space: space Argument: 192.168.10.5

Where is the general syntax and what is it for this command? Switch>show ip protocols

Prompt: Switch> Command: show Space: space Keyword: ip protocols

Name three terminal emulation programs:

PuTTY Tera Term SecureCRT

________________ is volatile memory. It loses all of its content when the device is powered off or restarted.

RAM

RAM

Random Access Memory

_____________________ is an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.

SSH (secure shell)

______________indicate an optional element (keyword or argument).

Square brackets [x]

The default prompt for interface configuration mode is?

Switch(config-if)#

The default prompt for line configuration mode is?

Switch(config-line)#

___________________ is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network.

Telnet

Which access method would be the most appropriate in-band access to the IOS over a network connection? - Console - Telnet/SSH - Aux

Telnet/SSH

____________________ enable remote access using Telnet or SSH to the device. Many Cisco switches support up to 16 of these that are numbered 0 to 15.

Virtual terminal lines (VTY)

To create a banner message of the day on a network device, use the ____________________ global config command.

banner motd # the message of the day #

Which is the command to configure a banner to be displayed when connecting to a switch? - banner $ Keep out $ - banner motd $ Keep out $ - display $ Keep out $ - login banner $ Keep out $

banner motd $ Keep out $

Groups of four hexadecimal digits are separated by a _______________.

colon (:)

The user can interact with the shell using a ___________ or a ______________.

command-line interface (CLI) graphical user interface (GUI)

From the privileged EXEC mode access the global configuration mode by entering the ___________________ command.

configure terminal

To move in and out of global configuration mode, use the __________ _____________ privileged EXEC mode command.

configure terminal

This is a physical management port that provides out-of-band access to a Cisco device.

console

A computer running terminal emulation software and a special console cable to connect to the device are required for a __________________________.

console connection

To save changes made to the running configuration to the startup configuration file, use the ________________________________ privileged EXEC mode command.

copy running-config startup-config

The __________________ is the IP address of the router that the host will use to access remote networks, including the internet.

default gateway address

Use the __________ privileged EXEC mode command to return to user EXEC mode.

disable

Privileged EXEC mode is sometimes called ______________ mode.

enable

To move from user EXEC mode to privileged EXEC mode, use the ______________ command.

enable

To secure privileged EXEC access, use the ___________________ password global config command.

enable secret

Secure privileged EXEC mode access.

enable secret "password"

To move from any subconfiguration mode to the privileged EXEC mode, enter the _______ command or enter the key combination ____________.

end, Ctrl+Z

The startup config is removed by using the _____________________ privileged EXEC mode command.

erase startup-config

The move from any subconfiguration mode of the global configuration mode to the mode one step above it in the hierarchy of modes, enter the ________ command.

exit

To return to the privileged EXEC mode, enter the ________ global config mode command.

exit

The operating system on home routers is usually called ____________.

firmware

Which IOS mode are you in if the Switch(config)# prompt is displayed? - global configuration mode - interface subconfiguration mode - line console subconfiguration mode - privileged EXEC mode - user EXEC mode

global configuration mode

The physical part of a computer including underlying electronics.

hardware

From global configuration mode, enter the command _________________ followed by the name of the switch and press enter.

hostname

What is the command to assign the name "Sw-Floor-2" to a switch? - hostname Sw-Floor-2 - host name Sw-Floor-2 - name Sw-Floor-2

hostname Sw-Floor-2

What is the command to enter VLAN 1 interface subconfiguration mode?

interface vlan 1

____________________ indicate arguments for which you supply values.

italics

Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.

kernel

The portion of the OS that interacts directly with computer hardware is known as the __________________.

kernel

Some devices, such as routers, may support a _________ ____________ __________ that was used to establish a CLI session remotely over a telephone connection using a modem.

legacy auxiliary port

To enter line subconfiguration mode, you use the _________ command followed by the management line type and number you wish to access.

line Example: Switch(config)# line console 0 Switch(config-line)# exit Switch(config)#

To secure user EXEC mode access, enter line console configuration mode using the _____________________________ global configuration command.

line console 0

What is the command to enter line subconfiguration mode?

line console 0

To secure VTY lines, enter line VTY mode using the ______________________ global config command.

line vty 0 15

What is the command to enter VTY line subconfiguration mode?

line vty 0 15

Enable user EXEC access using the ___________ command.

login

When naming a switch, to return the switch to the default prompt use the ______________________ global config command.

no hostname

______________________ refers to access via a dedicated management channel that is used for device management purposes only.

out-of-band access

Which IOS mode allows access to all commands and features? - global configuration mode - interface subconfiguration mode - line console subconfiguration mode - privileged EXEC mode - user EXEC mode

privileged EXEC mode

What is the general syntax for a switch command?

prompt, command, space, & keyword or arguments

Remove the changed commands individually, or reload the device using the ______________ privileged EXEC mode command to restore the startup-config.

reload

This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a __________________________ affects the operation of a Cisco device immediately.

running-config

SSH

secure shell

Encrypt all plaintext passwords.

service password-encryption

To encrypt all plaintext passwords, use the _______________________ global config command.

service password-encryption

Which command encrypts all plaintext passwords access on a switch? - enable secret - login - secret - service password-encryption

service password-encryption

The portion that interfaces with applications and the user is known as the _____________.

shell

The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.

shell

The ______________________ privileged EXEC mode command is used to view the running config.

show running-config

Use the __________________________ command to verify that passwords are now encrypted.

show running-config

To view the startup configuration file, use the __________________ privileged EXEC command.

show startup-config

This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.

startup-config

There are two system files that store the device configuration:

startup-config running-config

An IPv4 ______________________ is a 32-bit value that differentiates the network portion of the address from the host portion.

subnet mask

Cisco IOS Layer 2 switches have physical ports for devices to connect. These ports do not support Layer 3 IP addresses. Therefore , Switches have one or more _____________________.

switch virtual interfaces (SVIs)

Unlike SSH, _______________ does not provide a secure, encrypted connection and should only be used in a lab environment.

telnet


Related study sets

Week 31 Introduction to Clinical Pharmacokinetics

View Set

TEMA 2 quiz - AP Spanish Language and Culture

View Set

ATI TEAS 7 - English & Language Usage

View Set

GRE: Multiplication Table (1 - 15)

View Set