What are the three parts of an OS relevant to us?
Hardware ↔ Kernel ↔ Shell (CLI/GUI). Kernel talks to hardware; shell is the user/app interface.
Why is CLI preferred on network gear over GUI?
More complete features, stable, low overhead, scriptable—ideal for initial setup and troubleshooting.
Name two common access methods to a Cisco device.
Console (out-of-band) and SSH (in-band). Console works even if IP isn’t configured.
What is the AUX port used for?
Legacy modem dial-in (out-of-band) for remote CLI when IP connectivity isn’t available.
Name three terminal emulation programs.
PuTTY, Tera Term, SecureCRT (resize window, logging, fonts/colors).
What prompt indicates user EXEC vs privileged EXEC?
User EXEC ends with >; privileged EXEC ends with #.
Which command enters privileged EXEC? Leaves it?
enable enters; disable returns to user EXEC.
How do you enter/leave global configuration mode?
configure terminal to enter; exit to go up one level; end or Ctrl+Z to privileged EXEC.
Prompts for line and interface submodes?
(config-line)# and (config-if)#.
Shortest unique abbreviation concept (example)?
Commands can be shortened if unique: configure terminal → conf t.
Two IOS help tools available at the prompt.
? for context help; syntax checking (left→right parser) for errors.
Paging control when output shows –More–?
Space (page), Enter (line). Use filters like | include to narrow output.
First config you should apply to any device and why?
Hostname—confirms you’re on the right box (esp. over SSH) and aids documentation.
Command to set hostname to Sw-Floor-1.
conf t
hostname Sw-Floor-1
Which three access points should be password-protected at minimum?
Console, VTY (SSH/Telnet), and privileged EXEC (enable secret).
Secure console access (commands).
line console 0
password <pw>
login</pw>
Secure privileged EXEC (command + why).
enable secret <pw> (strong, hashed; controls full admin access).</pw>
Secure VTY lines 0–15 (commands).
line vty 0 15
password <pw>
login</pw>
What does service password-encryption do, and what doesn’t it do?
Obfuscates plaintext passwords in the config file (Type 7); does not encrypt traffic—use SSH for that.
Why configure a login banner (MOTD)?
Legal notice for authorized access; supports monitoring/prosecution policies.
Command to set a MOTD banner.
banner motd # Authorized Access Only #
Where do running and startup configs live?
running-config in RAM (volatile); startup-config in NVRAM (non-volatile).
How do you persist the current configuration?
copy running-config startup-config (aka write memory / wr on some images).
How to view the active configuration?
show running-config (startup is show startup-config).