2101 Ch02:  Basic Switch and End Device Configuration

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What is the primary function of User EXEC Mode in Cisco IOS?

  • To perform basic monitoring operations only (correct)
  • To install additional software on the device
  • To enter commands that change the device configuration
  • To provide access to all configuration commands

Which prompt indicates that the Cisco device is in Privileged EXEC Mode?

  • Router# (correct)
  • Router(config-line)#
  • Router>
  • Router(config)#

How is Global Configuration Mode accessed in Cisco IOS?

  • After entering the device's IP address
  • By entering privileged EXEC mode first (correct)
  • From User EXEC Mode directly
  • Using a specific command in Line Configuration Mode

What can be done in Interface Configuration Mode?

<p>Configure network interfaces or switch ports (A)</p> Signup and view all the answers

Which command mode is typically password-protected to restrict access?

<p>Privileged EXEC Mode (A)</p> Signup and view all the answers

What is the minimum recommended length for a secure password?

<p>8 characters (D)</p> Signup and view all the answers

Which combination is most effective when creating a password?

<p>Upper and lowercase letters, numbers, and special characters (D)</p> Signup and view all the answers

What command is used to enable remote access on VTY lines?

<p>line vty 0 15 (D)</p> Signup and view all the answers

Why should common words be avoided in passwords?

<p>They can be easily guessed. (D)</p> Signup and view all the answers

What command is used to encrypt plaintext passwords on a device?

<p>service password-encryption (B)</p> Signup and view all the answers

What is the first configuration command that should be issued on a Cisco IOS device?

<p>Set the device name or hostname (B)</p> Signup and view all the answers

What does the command syntax include in its structure?

<p>Command followed by keywords and arguments (B)</p> Signup and view all the answers

What does context-sensitive help provide when using the CLI?

<p>Information on available commands and their usage (A)</p> Signup and view all the answers

Which command is used to abort the current command or operation in Cisco IOS?

<p>Ctrl-C (C)</p> Signup and view all the answers

Which statement is true regarding the command line interpreter (CLI)?

<p>It provides immediate feedback for valid commands only. (C)</p> Signup and view all the answers

What is the main benefit of assigning unique device names in a network?

<p>To easily identify specific devices (A)</p> Signup and view all the answers

What is a key benefit of changing the default hostname of a device?

<p>It allows easier identification of network devices. (B)</p> Signup and view all the answers

Which of the following is NOT a guideline for naming hostnames?

<p>Start with a number (B)</p> Signup and view all the answers

Which command is used to enter global configuration mode?

<p>configure terminal (B)</p> Signup and view all the answers

What is the typical maximum length for hostnames?

<p>64 characters (D)</p> Signup and view all the answers

Which characters are NOT allowed in hostnames?

<p>Spaces (C)</p> Signup and view all the answers

What should be done to return a switch to its default prompt?

<p>Use the command 'no hostname'. (B)</p> Signup and view all the answers

What is the main security concern with network devices?

<p>Weak or easily guessed passwords (A)</p> Signup and view all the answers

How should passwords for network devices be configured?

<p>They must be encrypted. (D)</p> Signup and view all the answers

What should all networking devices do with administrative access?

<p>Limit access with passwords. (D)</p> Signup and view all the answers

Flashcards are hidden until you start studying

Study Notes

Cisco IOS Command Modes

  • User EXEC Mode: Limited capabilities for monitoring, can't change configurations; identified by the prompt ending with >.
  • Privileged EXEC Mode: Access to all commands, including configuration; identified by the prompt ending with #. Often password-protected for security.
  • Global Configuration Mode: Entered from privileged EXEC mode; allows configuration changes affecting the entire device; prompt ends with (config)#.

Subconfiguration Modes

  • Line Configuration Mode: Configure access methods (console, SSH, Telnet, AUX).
  • Interface Configuration Mode: Configure network interfaces on switches or routers.

Command Structure and Syntax

  • General command format: command followed by keywords and arguments.
  • Keyword: Predefined parameter (e.g., ip protocols).
  • Argument: User-defined value (e.g., 192.168.10.5).
  • Use ? for context-sensitive help; checks available commands, keywords, and arguments.
  • Ctrl-C: Abort current command; Ctrl-Z: Exit configuration mode; Ctrl-Shift-6: Interrupt ongoing IOS processes.

Device Naming Conventions

  • Default names are non-descriptive (e.g., "Switch"). Changing device names improves network management.
  • Hostname guidelines:
    • Start with a letter, no spaces, end with a letter/digit.
    • Use only letters, digits, dashes; must be <64 characters.
  • Hostnames in Cisco IOS preserve capitalization.

Password Security

  • Enforce strong passwords to secure device access.
  • Password guidelines:
    • Minimum eight characters; a mix of upper, lower, numbers, special characters.
    • Avoid common words; use unique passwords per device.
  • Use enable secret for privileged EXEC mode security; line vty for remote access security.

Password Encryption

  • service password-encryption command applies weak encryption to plaintext passwords in configuration files.
  • Use show running-config to check if passwords are encrypted.
  • Implement banners to notify users of access rights; important for legal processes.
  • Use banner motd # message # command for messaging; # acts as a delimiting character.

Configuration Files

  • startup-config: Saved in NVRAM; loaded on startup.
  • running-config: Stored in RAM; reflects real-time configurations and lost upon power-off.
  • Use show running-config and show startup-config commands to view configurations.
  • Always save changes to the startup configuration to prevent loss after reboot.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Related Documents

2101-Ch02.docx

More Like This

ITN 2.3 Cisco IOS Command Structure Quiz
5 questions
Cisco IOS CLI and Shells Overview
75 questions
Use Quizgecko on...
Browser
Browser