CCNA Routing and Switching - Chapter 2

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

What command is used to secure privileged EXEC access?

  • line vty 0 15
  • password password
  • login
  • enable secret password (correct)

Which command must be entered to enable password protection on the console line?

  • exit
  • line console 0
  • login
  • password cisco (correct)

How many VTY lines are typically supported by Cisco switches?

  • 12
  • 8
  • 16 (correct)
  • 20

What command makes the switch require a password when accessing the line console?

<p>login (A)</p>
Signup and view all the answers

Which of the following is NOT a step in securing remote Telnet or SSH access?

<p>set time (A)</p>
Signup and view all the answers

What is the primary purpose of the service password-encryption command?

<p>To encrypt passwords stored in configuration files (A)</p>
Signup and view all the answers

What is a potential risk associated with passwords found in startup-config and running-config files?

<p>They are visible in plaintext to anyone with file access. (C)</p>
Signup and view all the answers

What is a banner message used for in device configurations?

<p>To display legal warnings upon access attempts (A)</p>
Signup and view all the answers

What command is used to secure privileged EXEC access with a password?

<p>set enable password Cla55 (C)</p>
Signup and view all the answers

Which delimiter can be used when configuring a banner message?

<p>Any unique character that does not occur in the message (A)</p>
Signup and view all the answers

What is the primary purpose of the Cisco IOS in network devices?

<p>To enable communication between devices over a network (C)</p>
Signup and view all the answers

Which interface does the OS shell of the Cisco IOS provide for user interaction?

<p>Both Command-Line Interface and Graphical User Interface (B)</p>
Signup and view all the answers

What command structure does the Cisco IOS utilize for configuration?

<p>Hierarchical command structure (C)</p>
Signup and view all the answers

Which of the following is NOT a function of the Cisco IOS?

<p>Developing third-party software applications (D)</p>
Signup and view all the answers

In the context of a network device, what does the OS kernel primarily do?

<p>Communicates directly with hardware and manages resources (C)</p>
Signup and view all the answers

What command is used to save the current running configuration to the startup configuration?

<p>copy running-config startup-config (C)</p>
Signup and view all the answers

Which command displays the current configuration stored in RAM?

<p>show running-config (B)</p>
Signup and view all the answers

What is the primary purpose of the startup configuration file?

<p>To hold the configuration upon device reboot (A)</p>
Signup and view all the answers

What will happen if the running configuration file is not saved and power is interrupted?

<p>The running configuration will be lost (D)</p>
Signup and view all the answers

Which command can be used to erase the startup configuration?

<p>erase startup-config (D)</p>
Signup and view all the answers

Flashcards

Cisco IOS

The operating system used by Cisco network devices like routers and switches.

Operating system (OS)

Software that manages computer hardware and software resources.

Command-line interface (CLI)

A text-based interface used to give commands to a computer.

OS kernel

Part of an operating system that interacts directly with the hardware.

Signup and view all the flashcards

Hardware

The physical components of a computer.

Signup and view all the flashcards

Securing privileged EXEC access

Using the 'enable secret' command to protect access to privileged commands on a switch.

Signup and view all the flashcards

Securing user EXEC access

Protecting access to standard commands by setting passwords and requiring login on the console.

Signup and view all the flashcards

Securing remote access

Protecting access to the switch through remote connections (Telnet/SSH) using VTY lines and passwords.

Signup and view all the flashcards

VTY lines

Virtual Terminal lines; a Cisco feature that allows remote access to network devices.

Signup and view all the flashcards

enable secret password

A command to set a password for privileged EXEC mode access on a Cisco switch.

Signup and view all the flashcards

Password Encryption

The process of converting passwords into an unreadable format to protect them from unauthorized access.

Signup and view all the flashcards

Why Encrypt Passwords?

Protecting passwords in plain text makes them vulnerable to unauthorized access, potentially exposing confidential information.

Signup and view all the flashcards

Service Password-Encryption Command

A command used in Cisco devices to encrypt stored passwords, preventing them from being easily read.

Signup and view all the flashcards

Banner Messages

Messages displayed to users when they attempt to access a device, acting as legal warnings and deterrents.

Signup and view all the flashcards

Banner Message Configuration

The process of setting up banner messages using the banner motd command in Cisco's global configuration mode.

Signup and view all the flashcards

Running Configuration File

The configuration currently active on a Cisco IOS device, stored in RAM. This file is lost if power is interrupted.

Signup and view all the flashcards

Startup Configuration File

The configuration that is loaded when the device boots up, stored in NVRAM. This file is not lost if power is interrupted.

Signup and view all the flashcards

Save Running Config

Copies the current configuration (the running configuration) into the startup configuration file.

Signup and view all the flashcards

Reload Command

Restarts the device, loading the startup configuration. Useful to revert back to the last saved configuration.

Signup and view all the flashcards

Erase Startup-Config

Deletes the startup configuration file, effectively resetting the device to factory defaults.

Signup and view all the flashcards

Study Notes

CCNA Routing and Switching - Chapter 2

  • Cisco IOS software is used on networking devices like switches, routers, wireless access points, and firewalls
  • All electronic devices need an operating system
  • IOS devices have features and functions, and a command structure, for configuring and managing network devices
  • IOS devices can be configured via a command-line interface (CLI) or a graphical user interface (GUI)
  • Network devices can be assigned hostnames for easier identification on topology diagrams and during configuration
  • Hostnames are shown in CLI prompts
  • Administrative access is necessary on network devices

IOS Bootcamp

  • Understanding components and functions of Cisco IOS software
  • Purpose and capabilities of Cisco IOS
  • Accessing and navigating Cisco IOS for configuration
  • Command structure of Cisco IOS software

Basic Device Configuration

  • Initial network device settings using Cisco IOS software
  • Configuring hostnames using the CLI
  • Limiting access to device configurations
  • Saving the running configuration using IOS commands

Address Schemes

  • Configuring IP address parameters for small to medium-sized business networks using an IP addressing scheme
  • Understanding how devices communicate across network media
  • Configuring host devices with IP addresses
  • Verifying end-to-end device connectivity

Cisco IOS Modes of Operation

  • Cisco IOS modes use a hierarchical command structure
  • Each mode has a distinctive prompt and specific commands for its tasks

Primary Command Modes

  • User EXEC mode allows basic monitoring (view-only) commands
  • Privileged EXEC mode lets execute configuration and management commands

Configuration Command Modes

  • Global configuration mode (global config) affects the overall device operation
  • Sub modes like interface mode and line mode allow configurations of network interfaces and communication channels
  • Commands (enable, disable, exit, end, ^z) to move between different command modes

IOS Command Structure

  • Cisco IOS commands have specific formats and syntaxes
  • Commands often require keywords and arguments
  • The command line interpreter checks for errors like incomplete or ambiguous commands

Hot Keys and Shortcuts

  • Commands and keywords can be shortened to unique identifiers
  • Hotkeys (arrows, tab, control keys) can be used for navigation and actions in the command line

Save Configurations

  • Running configuration- stores current device settings in RAM
  • Startup configuration- stores settings used when device restarts (stored in NVRAM)
  • IOS commands (show startup-config, show running-config, copy running-config startup-config)

Alter the Running Configuration

  • Modifying saved configurations
  • Using reload command to restore startup configuration
  • Using erase startup-config command if needed

IP Addressing Overview

  • Devices like computers, printers and servers need an IP address and subnet mask to connect to a network
  • IP addresses are expressed as four decimal numbers separated by dots (e.g., 192.168.1.10)
  • Subnet mask determines network and host portion

Interfaces and Ports

  • Layer 2 switches use physical ports to connect devices
  • Virtual interfaces (SVIs) configured for remote management
  • VLAN 1 is the default VLAN and has an SVI

Configure IP Addressing for End Devices

  • Manually configuring IP addresses on a Windows host
  • Using the Control Panel > Network > Sharing Center > Change adapter settings
  • Obtaining IP addresses from a DHCP server

Switch Virtual Interface

  • Remotely manage a switch by configuring a VLAN (Virtual Local Area Network) 1 switch virtual interface (SVI)
  • SVI needs an IP address, subnet mask, and enabled mode

Verifying Connectivity

  • Verifying configuration using IP commands like ipconfig on a Windows host
  • Using show ip interface brief command on routers or switches

End-to-End Connectivity Test

  • Testing network connectivity with the ping command

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

CCNA ITN Chp2 Lab Sessions PDF

More Like This

Accessing Cisco IOS Devices
48 questions
Modull-2
13 questions

Modull-2

BriskConcertina514 avatar
BriskConcertina514
Switch and End Device Configuration
42 questions
Use Quizgecko on...
Browser
Browser