[ AETN1102 ] (2) Basic Switch and End Device Configuration

0.0(0)
Studied by 1 person
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/59

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 2:45 PM on 4/14/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

60 Terms

1
New cards

Shell

The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI (Command Line Interface) or GUI (Graphical User Interface)

2
New cards

Kernel

Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.

3
New cards

Hardware

The physical part of a computer including underlying electronics.

4
New cards

Graphical User Interface

Through this, PC operating system enables a user to:

  • Use a mouse to make selections and run programs

  • Enter text and text-based commands

  • View output on a monitor

5
New cards

Command-Line Interface

___-based network operating system enables a network technician to do the following:

  • Use a keyboard to run ___-based network programs

  • Use a keyboard to enter text and text-based commands

  • View output on a monitor

6
New cards

Console

A physical management port used to access a device in order to provide maintenance, such as performing the initial configurations using special cables.

7
New cards

Secure Shell

Establishes a secure remote CLI connection to a device, through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.)

8
New cards

Telnet

Establishes an insecure remote CLI connection to a device over the network. (Note: User authentication, passwords and commands are sent over the network in plaintext.)

9
New cards

AUX

Some devices, such as routers, may also support this port that was used to establish a CLI session remotely over a telephone connection using a modem.

10
New cards

Terminal Emulation Programs

These are used to connect to a network device by either a console port or by an SSH/Telnet connection.

11
New cards

User EXEC Mode

  • This allows access to only a limited number of basic monitoring commands

  • Identified by the CLI prompt that ends with the > symbol

12
New cards

Privileged EXEC Mode

  • Allows access to all commands and features

  • Identified by the CLI prompt that ends with the # symbol

13
New cards

Global Configuration Mode

Used to access configuration options on the device

14
New cards

Line Configuration Mode

Used to configure console, SSH, Telnet or AUX access

15
New cards

Interface Configuration Mode

Used to configure a switch port or router interface

16
New cards

Enable

To move from user EXEC mode to privilege EXEC mode, use the _____ command

17
New cards

Configure Terminal

To move in and out of global configuration mode, use the _______ command.

18
New cards

Exit

To return to privilege EXEC mode, use the ____ command.

19
New cards

Line

To move in and out of line configuration mode, use the ____ command followed by the management line type.

20
New cards

Exit

To return to global configuration mode, use the ___ command.

21
New cards

Exit

To move out of any subconfiguration mode to get back to global configuration mode, use the ____ command.

22
New cards

End

To return to privilege EXEC mode, use the ____ command or key combination Ctrl +Z

23
New cards

Keyword

This is a specific parameter defined in the operating system (in the figure, ip protocols).

24
New cards

Argument

This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5).

25
New cards

Context-Sensitive Help

This enables you to quickly find answers to these questions:

  • Which commands are available in each command mode?

  • Which commands start with specific characters or group of characters?

  • Which arguments and keywords are available to particular commands?

26
New cards

Command Syntax Check

This verifies that a valid command was entered by the user.

  • If the interpreter cannot understand the command being entered, it will provide feedback describing what is wrong with the command

27
New cards

hostname

The first configuration command on any device should be to give it a unique _______.

28
New cards

no hostname

To return the switch to the default prompt, use the ________ global config command

29
New cards

line console 0

[ Securing user EXEC mode access ]

First enter line console configuration mode using the ________ command in global configuration mode.

30
New cards

password

[ Securing user EXEC mode access ]

Next, specify the user EXEC mode password using the _______ command.

31
New cards

login

[ Securing user EXEC mode access ]

Finally, enable user EXEC access using the ______ command.

32
New cards

configure terminal

[ Securing privileged EXEC mode access ]

First enter global configuration mode by using the _______ command.

33
New cards

enable secret

[ Securing privileged EXEC mode access ]

Next, use the _______ password command.

34
New cards

line vty 0 15

[ Securing VTY line access ]

First enter line VTY configuration mode using the ________ command in global configuration mode.

35
New cards

password

[ Securing VTY line access ]

Next, specify the VTY password using the _______ command.

36
New cards

login

[ Securing VTY line access ]

Finally, enable VTY access using the ______ command.

37
New cards

service password-encryption

To encrypt all plaintext passwords, use the ___________ global config command.

38
New cards

show running-config

Use the __________ command to verify that the passwords on the device are now encrypted.

39
New cards

Banner Message

This is important to warn unauthorized personnel from attempting to access the device.

40
New cards

banner motd ##

To create a banner message of the day on a network device, use the ________ # (delimiting character) the message of the day # global config command.

41
New cards

startup-config file

  • Saved configuration file stored in NVRAM (non volatile RAM – its content is not lost when the device is powered off).

  • Contains all the commands that will be used by the device upon startup or reboot.

42
New cards

running-config file

  • Current configuration file stored in Random Access Memory (RAM). RAM is volatile memory, its content is lost when the device is powered off or restarted.

  • Changing the running configuration affects the operation of a Cisco device immediately

43
New cards

copy running-config startup-config

To save changes made to the running configuration to the startup configuration file, use the command __________ in the privileged EXEC mode

44
New cards

show

Use the ____ command to view the configurations files as indicated below.

45
New cards

reload

If changes made to the running config do not have the desired effect and the running-config has not yet been saved, you can restore the device to its previous configuration by using the _____ command in privileged EXEC mode.

  • This will cause the device to briefly go offline, leading to network downtime

46
New cards

erase startup-config

If the undesired changes were saved to the startup-config, it may be necessary to clear all the configurations, by using the _________ command in privilege EXEC mode.

47
New cards

Dotted Decimal

The structure of an IPv4 address is called ________ notation and is represented by four decimal numbers between 0 and 255

48
New cards

IPv4

This is a 32-bit numerical address that uniquely identifies each device on a network. These addresses are typically written in dotted-decimal notation, consisting of four groups of numbers separated by periods.

49
New cards

Subnet Mask

This:

  • Differentiates the network portion of the address from the host portion

  • Determines to which subnet the device is a member.

50
New cards

Default Gateway Address

The IP address of the router interface that the host will use to access remote networks, including the Internet.

51
New cards

DHCP

This is a network management protocol used on Internet Protocol (IP) networks for automatically assigning IP addresses and other communication parameters to devices connected to the network using a client–server architecture.

52
New cards

interface vlan 1

[ Switch Virtual Interface (SVI) Configuration ]

Enter the _________ command in global configuration mode.

53
New cards

ip-address ip-address subnet mask

[ Switch Virtual Interface (SVI) Configuration ]

Assign an IPv4 address using the ____________.

54
New cards

no shutdown

[ Switch Virtual Interface (SVI) Configuration ]

Enable the virtual interface using the ________ command.

55
New cards

show ip interface brief

Use command __________ to verify the interfaces and address settings

56
New cards

ipconfig

Use command C:\> ____ to display the IP configuration on a Windows PC

57
New cards

ping

Use the ___ command to test connectivity to another device

58
New cards

Ctrl-Shift-6

______ – interrupts the ping process

59
New cards

>

Symbol for User EXEC Mode

60
New cards

#

Symbol for Privileged EXEC Mode