Mod 2 Flashcards

(61 cards)

1
Q

What should be done regardless of the default behavior of a new switch?

A

All switches should be configured and secured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the purpose of a console port?

A

Provides out-of-band access to a Cisco device for maintenance purposes.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Fill in the blank: Out-of-band access refers to access via a dedicated management channel used for _______.

A

[device maintenance purposes]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is required for a console connection?

A

A computer running terminal emulation software and a special console cable.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is SSH used for in networking?

A

Establishing a secure CLI connection remotely over a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

True or False: SSH connections require active networking services on the device.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What do most versions of Cisco IOS include for SSH?

A

An SSH server and an SSH client.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is Telnet?

A

An insecure in-band method for establishing a CLI session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Fill in the blank: SSH connections are established through a _______.

A

[virtual interface]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the main difference between console access and SSH?

A

Console access does not require networking services; SSH does.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does GUI stand for?

A

Graphical User Interface

GUI allows users to interact with electronic devices through graphical icons and visual indicators.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Name three operating systems that utilize a GUI.

A
  • Windows
  • macOS
  • Linux KDE
  • Apple iOS
  • Android

These operating systems provide user-friendly environments for interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

True or False: A GUI requires extensive knowledge of the underlying command structure.

A

False

GUIs are designed to be user-friendly and reduce the need for knowledge of command structures.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Fill in the blank: A GUI allows users to interact with the system using _______.

A

graphical icons, menus, and windows

These elements make the interface accessible and intuitive.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is one advantage of using a GUI over a command-line interface?

A

More user-friendly

GUIs are designed to be intuitive, making them easier for most users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the primary function of a GUI?

A

To facilitate user interaction with the system

GUIs enable users to perform tasks without needing to understand complex commands.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

List two characteristics of GUI environments.

A
  • Use of graphical icons
  • Inclusion of menus and windows

These characteristics enhance user experience and accessibility.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the purpose of a PC operating system?

A

To enable users to:
* Use a mouse to make selections and run programs
* Enter text and text-based commands
* View output on a monitor

PC operating systems provide a graphical user interface (GUI) for user interaction.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does a CLI-based network operating system enable a network technician to do?

A

To:
* Use a keyboard to run CLI-based network programs
* Use a keyboard to enter text and text-based commands
* View output on a monitor

CLI stands for Command Line Interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Cisco IOS?

A

It is the operating system used by Cisco networking devices.

IOS stands for Internetwork Operating System.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the function of the auxiliary (AUX) port in networking devices?

A

The AUX port is used to establish a CLI session remotely over a telephone connection using a modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is required for the AUX port to operate?

A

The AUX port does not require networking services to be configured or available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Fill in the blank: The AUX port is similar to a _______ connection.

A

[console]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

True or False: The AUX port can be used to connect to a network without any prior configuration.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What type of devices may support an AUX port?
Some devices, such as routers.
26
What is the purpose of the console port on a Cisco device?
Provides out-of-band access for device maintenance ## Footnote Out-of-band access is via a dedicated management channel, accessible even if no networking services are configured.
27
What type of connection does SSH establish?
In-band secure CLI connection ## Footnote SSH is established through a virtual interface over a network and requires active networking services.
28
What is required for a console connection?
A computer running terminal emulation software and a special console cable ## Footnote This setup allows access to the Cisco device for initial configuration.
29
Is Telnet a secure method for remote connections?
No, Telnet is insecure and does not provide encryption ## Footnote User authentication and commands are sent in plaintext.
30
What is the recommended best practice for remote CLI connections?
Use SSH instead of Telnet ## Footnote SSH provides a secure and encrypted connection, while Telnet does not.
31
What does SSH require for establishment on a Cisco device?
Active networking services and an interface configured with an address ## Footnote Most versions of Cisco IOS include both an SSH server and client.
32
What type of connection is Telnet considered?
In-band connection ## Footnote Telnet is used to establish a CLI session through a virtual interface over a network.
33
Fill in the blank: The console port provides _______ access to a Cisco device.
out-of-band
34
True or False: SSH is less secure than Telnet.
False ## Footnote SSH is a secure method, while Telnet is insecure.
35
What types of software does Cisco IOS include for Telnet?
Telnet server and Telnet client ## Footnote This allows for remote CLI sessions using Telnet.
36
What is User Exec Mode?
A mode that allows access to only a limited number of basic monitoring commands. ## Footnote Often referred to as 'view-only' mode.
37
What is Privileged EXEC Mode?
A mode that allows access to all commands and features, enabling users to execute configuration and management commands. ## Footnote Users can also use any monitoring commands in this mode.
38
What is the default device prompt for a switch?
Switch> ## Footnote This indicates that the device is in User Exec Mode.
39
What is the default device prompt for a router?
Router> ## Footnote This indicates that the device is in User Exec Mode.
40
What is the default device prompt for a switch in Privileged EXEC Mode?
Switch# ## Footnote This indicates that the device has elevated privileges.
41
What is the default device prompt for a router in Privileged EXEC Mode?
Router# ## Footnote This indicates that the device has elevated privileges.
42
What is the commonly used term for global configuration mode?
Global config mode ## Footnote Global configuration mode is essential for making changes that affect the device's overall operation.
43
How is global configuration mode identified in the CLI?
By a prompt that ends with (config)# after the device name ## Footnote Example: Switch(config)#
44
What are the two common subconfiguration modes?
* Line Configuration Mode * Interface Configuration Mode ## Footnote These modes allow configuration of specific parts or functions of the device.
45
What is Line Configuration Mode used for?
To configure console, SSH, Telnet, or AUX access ## Footnote Line Configuration Mode allows access configuration for remote management.
46
What is Interface Configuration Mode used for?
To configure a switch port or router network interface ## Footnote This mode is critical for setting up network interfaces.
47
What does the command-line prompt indicate in the CLI?
The current mode of operation ## Footnote Each mode has a unique prompt that helps the user identify their current configuration context.
48
What is the default prompt for line configuration mode?
Switch(config-line)# ## Footnote This prompt indicates that the user is in line configuration mode.
49
What is the default prompt for interface configuration mode?
Switch(config-if)# ## Footnote This prompt indicates that the user is in interface configuration mode.
50
To secure user EXEC mode for the console, you must first enter 1. ______ configuration mode using the **2.** ______ **3.** ______ global config command. Then, set the password with the **4.** ______ command and finally enable access with the **5.** ______ command.
1. line console 2. line 3. console 0 4. password [your_password] 5. login
51
When you first connect to a Cisco device, you are placed in 1. ______ mode. To add a password to this mode for the console port, you navigate to line configuration mode. The command to enter this mode is **2.** ______. The password itself is set with the **3.** ______ command, and access is enabled by issuing the **4.** ______ command.
1. user EXEC 2. line console 0 3. password 4. login
52
The global configuration command used to secure access to the most important administrative mode is **1.** ______.
enable secret
53
After securing the console with a password for 1. ______ mode, you must also secure the more powerful 2. ______ mode to prevent unauthorized configuration changes. This is done from global config mode with the **3.** ______ command.
user EXEC privileged EXEC enable secret
54
To gain full administrator access to all commands, you must enter 1. ______ EXEC mode. This mode is secured using the global configuration command **2.** ______.
privileged enable secret
55
1. ______ lines enable remote access to a device using protocols like Telnet or SSH. To secure them, you enter configuration mode for all lines with the **2.** ______ command. You then set a password and enable access with the **3.** ______ command
VTY (Virtual Terminal) line vty 0 15 login
56
Which of the following is the correct sequence of commands to secure remote Telnet/SSH access (VTY lines) on a Cisco device? A. enable secret -> login -> line vty 0 15 B. line vty 0 15 -> password *cisco* -> login C. login -> password *cisco* -> line console 0 D. line vty 0 15 -> login -> enable secret *cisco*
Answer: B. line vty 0 15 -> password *cisco* -> login Explanation: You must first enter the appropriate line configuration mode using line vty 0 15. Then, you specify the password that will be used for access with the password command. Finally, you enable the password check at login with the login command.
57
The 1. _________ global configuration command is used to apply weak encryption to plaintext passwords in the configuration file, preventing them from being easily read. The primary purpose of this command is to 2. _________. 1. A) enable secret B) crypto key generate rsa C) service password-encryption D) username secret 2. A) secure passwords as they are sent over the network B) encrypt all passwords in the device's memory (RAM) C) keep unauthorized individuals from viewing passwords in the configuration file D) automatically create a strong encrypted password for the enable mode
1. C) service password-encryption 2. C) keep unauthorized individuals from viewing passwords in the configuration file
58
You need to configure a Message of the Day (MOTD) banner that says "UNAUTHORIZED ACCESS PROHIBITED" on a Cisco device. Which is the correct command sequence? A. config-term # banner motd UNAUTHORIZED ACCESS PROHIBITED # B. banner motd # UNAUTHORIZED ACCESS PROHIBITED # C. enable banner # UNAUTHORIZED ACCESS PROHIBITED # D. motd banner "UNAUTHORIZED ACCESS PROHIBITED"
Correct Answer: B. banner motd # UNAUTHORIZED ACCESS PROHIBITED # Explanation: The command must be entered in global configuration mode, which the question implies you are already in. The correct syntax begins with banner motd. A delimiting character (like #) is used immediately after the command to mark the start and end of the message text. This character must not appear in the message itself.
59
After configuring passwords and a banner on a switch, you power it off for the night. When you power it back on the next morning, you find that all your configurations are lost. This is because you failed to save the changes from the __________ to the __________. A) NVRAM; RAM B) startup-config; running-config C) RAM; Flash D) running-config; startup-config
Correct Answer: D. running-config; startup-config Explanation: The running-config is stored in volatile RAM and is lost on a power cycle. The startup-config is stored in non-volatile NVRAM and is loaded at bootup. To make changes permanent, you must copy the running-config to the startup-config using the copy running-config startup-config command.
60
When configuring a host with the IP address 192.168.1.10, the subnet mask 255.255.255.0 is required to _________. The IP address 192.168.1.1, configured as the default gateway, is the address of the _________. A) encrypt the host's traffic; switch to which the host is connected B) identify the network portion of the address; router used to reach remote networks C) assign a unique physical address; firewall protecting the network D) determine the IP version being used; DNS server for name resolution
Correct Answer: B. identify the network portion of the address; router used to reach remote networks Explanation: The subnet mask's job is to separate the IP address into a network portion and a host portion, defining the local subnet. The default gateway is the IP address of a local router that a host uses to communicate with devices on other networks.
61
QoS stands for
Quality of Services and is a networking and telecommunications strategy for managing network traffic by prioritizing certain data types over others to ensure consistent performance for critical applications, such as voice calls or video conferencing.