Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

network 1 mod 2

QuestionAnswer
All end devices and network devices require one Operating system (OS)
the portion of the OS that interacts directly with computer hardware Kernel
The portion that interfaces with applications and the user Shell
The user can interact with the shell using a: command-line interface (CLI) or a graphical user interface (GUI).
The physical part of a computer including underlying electronics. Hardware
allows the user to interact with the system using an environment of graphical icons, menus, and windows Graphical User Interface
The operating system on home routers firmware
this is a physical management port that provides out-of-bound access to a Cisco device Console
is an in-band and recommended method for remotely establishing a secure CLI connection Secure Shell (SSH)
is an insecure, in band method of remotely establishing a CLI session Telnet
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured? Console
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch? Console
Which access method would be the most appropriate in-band access to the IOS over a network connection? Telnet/SSH
Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through a telephone connection? Aux
This mode has limited capabilities but is useful for basic operations User EXEC Mode
This mode allows access to all commands and features Privileged EXEC Mode
is identified by a prompt that ends with (config)# after the device name, such as Switch(config)#. Global Configuration Mode
Used to configure console, SSH, Telnet, or AUX access. Line Configuration Mode
Used to configure a switch port or router network interface. Interface Configuration Mode
the default prompt for line configuration mode Switch(config-line)#
default prompt for interface configuration mode Switch(config-if)#
used to move from user EXEC mode to privileged EXEC mode enable command
used to return to user EXEC mode disable privileged EXEC mode command
sometimes called enable mode. Privileged EXEC mode
used to move in and out of global configuration mode, configure terminal
used to return to the privileged EXEC mode exit global config mode command
used to enter line subconfiguration mode line command
used to exit a subconfiguration mode and return to global configuration mode. exit command
used to move from any subconfiguration mode of the global configuration mode to the mode one step above it in the hierarchy of modes exit command
used to move from any subconfiguration mode to the privileged EXEC mode end command / ctrl + Z
has a specific format, or syntax, and can only be executed in the appropriate mode IOS Command
This is a specific parameter defined in the operating system keyword
This is not predefined; it is a value or variable defined by the user argument
used to submit the command to the command interpreter. enter key
provides the pattern, or format, that must be used when entering a command. syntax
indicates commands and keywords that you enter literally as shown Boldface text
indicates arguments for which you supply values italics
indicate an optional element (keyword or argument) [] / square brackets
indicates a required element (keyword or argument) {} / braces
indicate a required choice within an optional element [ { | } ] / braces and vertical lines within square brackets
is typically used to identify the purpose of an interface description command
the user-defined argument is the ip-address of the destination device ping command
just like ping command but has more information traceroute command
enables you to quickly find answers context-sensitive help
verifies that a valid commands was entered by the user command syntax check
used To secure privileged EXEC access enable secret command
enable remote access using Telnet or SSH to the device. Virtual Terminal lines (VTY)
used To secure VTY lines line vty 0 15 command
used specify the VTY password password command
used to enable VTY access login command
used to encrypt all plaintext passwords service password-encryption command
used to verify that the passwords are now encrypted show running-config command
used to create a banner message banner motd # ~~ # command
entered before and after a massage '#' / delimiting character
What is the command to assign the name “Sw-Floor-2” to a switch? hostname Sw-Floor-2
How is the privileged EXEC mode access secured on a switch? enable secret class
Which command enables password authentication for user EXEC mode access on a switch? login
Which command encrypts all plaintext passwords access on a switch? service password-encryption
which command is used to set a banner banner motd
This is the saved configuration file that is stored in NVRAM startup-config
This is stored in Random Access Memory (RAM). running-config
is used to view the running config show running-config
To view the startup configuration file show startup-config
to save changes made to the running configuration to the startup configuration file copy running-config startup-config
used to remove the changed commands individually or reload the device reload
is the primary means of enabling devices to locate one another and establish end-to-end communication on the internet. ip address
has a structure called dotted decimal notation and is represented by four decimal numbers between 0 and 255 IPv4 address
has 128 bits in length and written as a string of hexadecimal values IPv6 address
an interface that has no physical port associated with it Switch virtual interface (SVI)
Created by: gabsky
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards