Topic 2(Basic Switch and End Device Configuration)

0.0(0)
Studied by 2 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/83

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 3:06 PM on 4/11/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

84 Terms

1
New cards

Shell

The user interface that allows users to request specific

tasks from the computer. These requests can be made either through the CLI (Command Line Interface) or GUI (Graphical User Interface).

2
New cards

Kernel

Communicates between the hardware and software of a

computer and manages how hardware resources are used to meet software requirements.

3
New cards

Hardware

The physical part of a computer including underlying electronics.

4
New cards

Command-line interface

What does CLI stand for ?

5
New cards

CLI

enables a network technician to do the
following:
• Use a keyboard to run Command-line based network
programs
• Use a keyboard to enter text and text-based
commands
• View output on a monitor

6
New cards

Console

A physical management port used to access a device in order to provide maintenance, such as performing the initial configurations.

7
New cards

Secure Shell (SSH)

Establishes a secure remote CLI connection to a device,
through a virtual interface, over a network. (Note: This is the recommended method for remotely connecting to a device.)

8
New cards

Telnet

Establishes an insecure remote CLI connection to a device over the
network. (Note: User authentication, passwords and commands are sent over the network in plaintext.)

9
New cards

Terminal emulation programs

are used to connect to a network device
by either a console port or by an
SSH/Telnet connection.

10
New cards

PuTTy

give 1 example of terminal emaulation program

11
New cards

User Exec Mode

Allows access to only a limited
number of basic monitoring
commands

12
New cards

User Exec Mode

Identified by the CLI prompt that ends
with the > symbol

13
New cards

Privileged EXEC Mode

Allows access to all commands and features

14
New cards

Privileged EXEC Mode

Identified by the CLI prompt that ends with the # symbol

15
New cards

Global Configuration Mode

Used to access configuration options on the device

16
New cards

Line and Interface Configuration Mode

What are the two Subconfiguration Modes?

17
New cards

Line Configuration Mode

Used to configure console, SSH, Telnet or AUX access

18
New cards

Interface Configuration Mode

Used to configure a switch port or router interface

19
New cards

enable/en

To move from user EXEC mode to privilege EXEC mode, use the _______command.

20
New cards

configure terminal/conf t

To move in and out of global configuration
mode, use the ______________
command.

21
New cards

exit/end

To close a session in a command line interface.

22
New cards

interface FastEthernet 0/1

To move directly from one subconfiguration mode to another, type in the desired subconfiguration mode command. In the example, the command prompt changes from (config-line)# to (config-if)#.

23
New cards

Keyword

This is a specific parameter defined in the operating system.

24
New cards

Argument

This is not predefined; it is a value or variable defined by the user.

25
New cards

Context Sensitive Help

enables you to quickly find answers to these questions:
• Which commands are available in each
command mode?
• Which commands start with specific characters
or group of characters?
• Which arguments and keywords are available
to particular commands?

26
New cards

?

what command to use context sensitive help?

27
New cards

Command syntax check

verifies that a valid command was entered by the user.
• If the interpreter cannot understand the command being entered, it will provide feedback describing what is wrong with the command.

<p><span style="color: rgb(255, 255, 255);"><span>verifies that a valid command was entered by the user.</span><span><br></span><span>• If the interpreter cannot understand the command being entered, it will provide feedback describing what is wrong with the command.</span></span></p>
28
New cards

Tab

Completes a partial command name entry.

29
New cards

Backspace

Erases the character to the left of the cursor.

30
New cards

Left Arrow/Ctrl+B

Moves the cursor one character to the left.

31
New cards

Right Arrow/Ctrl+F

Moves the cursor one character to the right.

32
New cards

Up Arrow/Ctrl+P

Recalls the commands in the history buffer, beginning with the most recent commands.

33
New cards

—More—

When a command output produces more text
than can be displayed in a terminal window, the
IOS will display a “______” prompt.

34
New cards

Enter

Displays the next line.

35
New cards

Space Bar

Displays the next screen.

36
New cards

Any other key

Ends the display string, returning to privileged EXEC mode.

37
New cards

Ctrl+C or Z

When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode.

38
New cards

Ctrl+Shift+6

All-purpose break sequence used to
abort DNS lookups, traceroutes,
pings, etc.

39
New cards

Device Names

• The first configuration command on any device should be to give it a unique hostname.
• By default, all devices are assigned a factory default name. For example, a Cisco IOS
switch is "Switch.”

40
New cards

line console 0

To move in and out of line configuration
mode, use the ______ command followed by
the management line type.

41
New cards

en, conf t, line console 0, password cisco, login, end

What are the commands to apply the password for User Exec Mode, in the console.

42
New cards

en, conf t, enable secret class, exit

what are the commands to configure password when entering Privileged Exec Mode?

43
New cards

conf t, line vty 0 15, password cisco, login, end

what are the steps in securing vty line access

44
New cards

VTY lines

enable remote access using Telnet or SSH to the device.

45
New cards

service password-encryption

To encrypt all plaintext passwords, use the _______________ global config command.

46
New cards

Encrypt Passwords

The startup-config and running-config files display most passwords in plaintext.

47
New cards

show running-config

Use the ____________ command to verify that the passwords on the device are now encrypted.

48
New cards

banner messages

is important to warn unauthorized personnel from attempting to access the device.

49
New cards

banner motd #—#

To create a banner message of the day on a network device, use the _______ the message of the day # global config command.

50
New cards

#

in the command syntax is called
the delimiting character. It is entered before
and after the message.

51
New cards

startup-config file

Contains all the commands that will be used by the device upon startup or reboot.

52
New cards

startup-config file

Saved configuration file stored in NVRAM (non volatile RAM – its content is not lost when the device is powered off).

53
New cards

Non volatile ram

NVRM stands for?

54
New cards

running-config file

Current configuration file stored in Random Access Memory (RAM). RAM is volatile memory, its content is lost when the device is powered off or restarted.

55
New cards

True

TRUE OR FALSE:
Changing the running configuration affects the operation of a Cisco device immediately.

56
New cards

copy running-config startup-config

To save changes made to the running configuration to the startup configuration file, use the command ____________________ in the privileged EXEC mode.

57
New cards

show

Use the ____ command to view the configurations files as indicated below.

58
New cards

reload then enter

If changes made to the running config do not have the desired effect and the running-config has
not yet been saved, you can restore the device to its previous configuration:
• Remove the changed commands individually, or
• ______ the device using the ______ command in privilege EXEC mode.

59
New cards

erase startup-config then enter

If the undesired changes were saved to the startup-config, it may be necessary to clear all the configurations

60
New cards

IP address

Locate one another

61
New cards

IP address

Establish end-to-end communication on the internet.

62
New cards

dotted decimal notation

The structure of an IPv4 address is called __________ and is represented by four decimal numbers between 0 and 255.

63
New cards

32 bit

An IPv4 subnet mask is a _____ value

64
New cards

Subnet mask/IPv4 mask

Differentiates the network portion of the address from the host portion

65
New cards

Subnet mask

Determines to which subnet the device is a member.

66
New cards

Default gateway address


is the IP address of the router interface that the host will use to access remote networks, including the Internet.

67
New cards

Dynamic Host Configuration Protocol

What does dhcp stand for

68
New cards

Control panel, network sharing center, change adapter settings, properties, internet protocol 4, properties, Obtain an IP address
automatically, Obtain DNS server address
automatically

To configure DHCP on a Windows PC

69
New cards

Control panel, network sharing center, change adapter settings, properties, internet protocol 4, properties

To manually configure an IPv4 address on a
Windows PC?

70
New cards

conf t, interface vlan 1, ip address ip address subnet mask, no shutdown

To configure an SVI on a switch:

71
New cards

ping

Use the ____ command to test
connectivity to another device.

72
New cards

show ip interface brief

Use command _______ to verify the interfaces and address settings

73
New cards

ipconfig

Use command _____ to display the IP configuration on a Windows PC

74
New cards

Ctrl+Shift+6

interrupts the ping process

75
New cards

Console, Secure Shell (SSH), Telnet

What are the three ways a user can access the Cisco IOS

76
New cards

Privileged Exec Mode

allows access to all commands and features.

77
New cards

Context Sensitive Help

Enables us to quickly find answers to the questions

78
New cards

reload

it causes the device to briefly go offline, leading to network downtime.

79
New cards

IP address

Dotted Decimal, 4 decimal numbers between 0 and 255.

80
New cards

IPv4 mask

a 32 bit that differentiates the network position of the address from the host portion.

81
New cards

DHCP

enables automatic IPv4 address configuration for every end device that are DHCP-enabled.

82
New cards

ping

what command is used to verify the end-to-end commectivity?

83
New cards

to access the switch remotely

What is the purpose of configuring an IP Address and a subnet mask on SVI (VLAN

1) on a Switch?

84
New cards

Default Gateway address

the ip address of the router that the host will use to access remote networks, including the internet.