Module 2 Flashcards

(48 cards)

1
Q

What are the three parts of an OS relevant to us?

A

Hardware ↔ Kernel ↔ Shell (CLI/GUI). Kernel talks to hardware; shell is the user/app interface.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Why is CLI preferred on network gear over GUI?

A

More complete features, stable, low overhead, scriptable—ideal for initial setup and troubleshooting.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Name two common access methods to a Cisco device.

A

Console (out-of-band) and SSH (in-band). Console works even if IP isn’t configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What is the AUX port used for?

A

Legacy modem dial-in (out-of-band) for remote CLI when IP connectivity isn’t available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Name three terminal emulation programs.

A

PuTTY, Tera Term, SecureCRT (resize window, logging, fonts/colors).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What prompt indicates user EXEC vs privileged EXEC?

A

User EXEC ends with >; privileged EXEC ends with #.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Which command enters privileged EXEC? Leaves it?

A

enable enters; disable returns to user EXEC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How do you enter/leave global configuration mode?

A

configure terminal to enter; exit to go up one level; end or Ctrl+Z to privileged EXEC.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Prompts for line and interface submodes?

A

(config-line)# and (config-if)#.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Shortest unique abbreviation concept (example)?

A

Commands can be shortened if unique: configure terminal → conf t.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Two IOS help tools available at the prompt.

A

? for context help; syntax checking (left→right parser) for errors.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Paging control when output shows –More–?

A

Space (page), Enter (line). Use filters like | include to narrow output.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

First config you should apply to any device and why?

A

Hostname—confirms you’re on the right box (esp. over SSH) and aids documentation.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Command to set hostname to Sw-Floor-1.

A

conf t
hostname Sw-Floor-1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which three access points should be password-protected at minimum?

A

Console, VTY (SSH/Telnet), and privileged EXEC (enable secret).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Secure console access (commands).

A

line console 0
password <pw>
login</pw>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Secure privileged EXEC (command + why).

A

enable secret <pw> (strong, hashed; controls full admin access).</pw>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Secure VTY lines 0–15 (commands).

A

line vty 0 15
password <pw>
login</pw>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What does service password-encryption do, and what doesn’t it do?

A

Obfuscates plaintext passwords in the config file (Type 7); does not encrypt traffic—use SSH for that.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Why configure a login banner (MOTD)?

A

Legal notice for authorized access; supports monitoring/prosecution policies.

21
Q

Command to set a MOTD banner.

A

banner motd # Authorized Access Only #

22
Q

Where do running and startup configs live?

A

running-config in RAM (volatile); startup-config in NVRAM (non-volatile).

23
Q

How do you persist the current configuration?

A

copy running-config startup-config (aka write memory / wr on some images).

24
Q

How to view the active configuration?

A

show running-config (startup is show startup-config).

25
Rollback: you made bad changes but didn’t save—how to revert?
reload and do not save when prompted.
26
Rollback: you saved bad changes—how to factory reset configs?
erase startup-config then reload.
27
Why capture configs to a text file and how?
Archival/restoration/versioning. Enable session logging in the terminal app and run show running-config.
28
Two strong password guidelines to follow.
8+ chars with mixed types; avoid reuse/common words (use a generator/MFA).
29
Does a Layer-2 switch need an IP to switch frames?
No—IP is only for management (SVI), not for basic L2 switching.
30
What is an SVI and its default on a L2 switch?
Switch Virtual Interface for management; default is VLAN 1.
31
Configure SVI on VLAN 1 with 192.168.1.20/24 and bring it up.
int vlan 1 ip address 192.168.1.20 255.255.255.0 no shutdown
32
Why does a switch need a default gateway and where to set it?
For off-subnet management (e.g., SSH from another VLAN/site). Set in global mode: ip default-gateway 192.168.1.1
33
Manual IPv4 config steps on Windows (high level).
NIC Properties → IPv4 Properties → set IP, mask, gateway, DNS.
34
Automatic addressing on end devices—what do you enable?
DHCP: “Obtain an IP address automatically” and DNS automatically.
35
IPv6 dynamic addressing methods to know.
DHCPv6 and SLAAC.
36
Command to verify IP config on Windows.
ipconfig (add /all for detailed info).
37
Four verification commands after SVI/DHCP labs (useful habits).
show ip interface brief, show vlan brief, show interfaces status, show mac address-table
38
Minimal sequence to harden a fresh switch (order matters).
Console password → enable secret → hostname → VTY passwords (then SSH) → service password-encryption → banner motd → copy run start.
39
Why start via console before enabling SSH?
Ensures you can recover from mistakes and secure remote access safely before exposing management over IP.
40
Two reasons to prefer SSH over Telnet.
Encryption and credential protection (Telnet is plaintext).
41
Which IOS mode must you be in to change global device settings?
Global configuration mode (config)#.
42
How do you jump from any submode back to privileged EXEC quickly?
end or Ctrl+Z.
43
What’s the practical impact of --More-- during a change window?
It can slow you down; use filters (| include/exclude) or increase terminal length.
44
Name two risks of leaving the hostname at its default (“Switch”).
You might misconfigure the wrong device; poor documentation/troubleshooting.
45
Give a one-liner to explain “why” for service password-encryption.
Prevents shoulder-surfing / config-file snooping of plaintext passwords.
46
Harden VTY lines for local users and SSH-only (core steps)?
username admin secret ip domain-name lab.local crypto key generate rsa modulus 2048 line vty 0 15 login local transport input ssh
47
Disable DNS lookups on typos (why/command)?
Prevents long delays after mistyped commands; no ip domain-lookup
48
Restore saved config into RAM (merge)?
copy startup-config running-config