1/59
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
Shell
The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI (Command Line Interface) or GUI (Graphical User Interface)
Kernel
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Hardware
The physical part of a computer including underlying electronics.
Graphical User Interface
Through this, PC operating system enables a user to:
Use a mouse to make selections and run programs
Enter text and text-based commands
View output on a monitor
Command-Line Interface
___-based network operating system enables a network technician to do the following:
Use a keyboard to run ___-based network programs
Use a keyboard to enter text and text-based commands
View output on a monitor
Console
A physical management port used to access a device in order to provide maintenance, such as performing the initial configurations using special cables.
Secure Shell
Establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.)
Telnet
Establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords and commands are sent over the network in plaintext.)
AUX
Some devices, such as routers, may also support this port that was used to establish a CLI session remotely over a telephone connection using a modem.
Terminal Emulation Programs
These are used to connect to a network device by either a console port or by an SSH/Telnet connection.
User EXEC Mode
This allows access to only a limited number of basic monitoring commands
Identified by the CLI prompt that ends with the > symbol
Privileged EXEC Mode
Allows access to all commands and features
Identified by the CLI prompt that ends with the # symbol
Global Configuration Mode
Used to access configuration options on the device
Line Configuration Mode
Used to configure console, SSH, Telnet or AUX access
Interface Configuration Mode
Used to configure a switch port or router interface
Enable
To move from user EXEC mode to privilege EXEC mode, use the _____ command
Configure Terminal
To move in and out of global configuration mode, use the _______ command.
Exit
To return to privilege EXEC mode, use the ____ command.
Line
To move in and out of line configuration mode, use the ____ command followed by the management line type.
Exit
To return to global configuration mode, use the ___ command.
Exit
To move out of any subconfiguration mode to get back to global configuration mode, use the ____ command.
End
To return to privilege EXEC mode, use the ____ command or key combination Ctrl +Z
Keyword
This is a specific parameter defined in the operating system (in the figure, ip protocols).
Argument
This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5).
Context-Sensitive Help
This enables you to quickly find answers to these questions:
Which commands are available in each command mode?
Which commands start with specific characters or group of characters?
Which arguments and keywords are available to particular commands?
Command Syntax Check
This verifies that a valid command was entered by the user.
If the interpreter cannot understand the command being entered, it will provide feedback describing what is wrong with the command
hostname
The first configuration command on any device should be to give it a unique _______.
no hostname
To return the switch to the default prompt, use the ________ global config command
line console 0
[ Securing user EXEC mode access ]
First enter line console configuration mode using the ________ command in global configuration mode.
password
[ Securing user EXEC mode access ]
Next, specify the user EXEC mode password using the _______ command.
login
[ Securing user EXEC mode access ]
Finally, enable user EXEC access using the ______ command.
configure terminal
[ Securing privileged EXEC mode access ]
First enter global configuration mode by using the _______ command.
enable secret
[ Securing privileged EXEC mode access ]
Next, use the _______ password command.
line vty 0 15
[ Securing VTY line access ]
First enter line VTY configuration mode using the ________ command in global configuration mode.
password
[ Securing VTY line access ]
Next, specify the VTY password using the _______ command.
login
[ Securing VTY line access ]
Finally, enable VTY access using the ______ command.
service password-encryption
To encrypt all plaintext passwords, use the ___________ global config command.
show running-config
Use the __________ command to verify that the passwords on the device are now encrypted.
Banner Message
This is important to warn unauthorized personnel from attempting to access the device.
banner motd ##
To create a banner message of the day on a network device, use the ________ # (delimiting character) the message of the day # global config command.
startup-config file
Saved configuration file stored in NVRAM (non volatile RAM – its content is not lost when the device is powered off).
Contains all the commands that will be used by the device upon startup or reboot.
running-config file
Current configuration file stored in Random Access Memory (RAM). RAM is volatile memory, its content is lost when the device is powered off or restarted.
Changing the running configuration affects the operation of a Cisco device immediately
copy running-config startup-config
To save changes made to the running configuration to the startup configuration file, use the command __________ in the privileged EXEC mode
show
Use the ____ command to view the configurations files as indicated below.
reload
If changes made to the running config do not have the desired effect and the running-config has not yet been saved, you can restore the device to its previous configuration by using the _____ command in privileged EXEC mode.
This will cause the device to briefly go offline, leading to network downtime
erase startup-config
If the undesired changes were saved to the startup-config, it may be necessary to clear all the configurations, by using the _________ command in privilege EXEC mode.
Dotted Decimal
The structure of an IPv4 address is called ________ notation and is represented by four decimal numbers between 0 and 255
IPv4
This is a 32-bit numerical address that uniquely identifies each device on a network. These addresses are typically written in dotted-decimal notation, consisting of four groups of numbers separated by periods.
Subnet Mask
This:
Differentiates the network portion of the address from the host portion
Determines to which subnet the device is a member.
Default Gateway Address
The IP address of the router interface that the host will use to access remote networks, including the Internet.
DHCP
This is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture.
interface vlan 1
[ Switch Virtual Interface (SVI) Configuration ]
Enter the _________ command in global configuration mode.
ip-address ip-address subnet mask
[ Switch Virtual Interface (SVI) Configuration ]
Assign an IPv4 address using the ____________.
no shutdown
[ Switch Virtual Interface (SVI) Configuration ]
Enable the virtual interface using the ________ command.
show ip interface brief
Use command __________ to verify the interfaces and address settings
ipconfig
Use command C:\> ____ to display the IP configuration on a Windows PC
ping
Use the ___ command to test connectivity to another device
Ctrl-Shift-6
______ – interrupts the ping process
>
Symbol for User EXEC Mode
#
Symbol for Privileged EXEC Mode