• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/25

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

25 Cards in this Set

  • Front
  • Back

Hostnames should(5):

-start with a letter




-contain no spaces




-end with a letter or digit




-use only letters, digits, and dashes




-be less than 64 characters in length

If the device name is not explicitly configured, a factory assigned default name is used by the Cisco IOS. The default name for a Cisco IOS switch is...

..."Switch."

Are hostnames case sensitive?

Yes.

From global configuration mode, enter the command ___ followed by the name of the switch and press Enter. Notice the change in the command prompt name.

hostname

To remove hostname use the..

...no hostname command.

Limiting Device Access


Securing Administrative Access(3):

-Secure privileged EXEC access with a password.




-Secure user EXEC access with a password




-Secure remote Telnet access with a password.

Limiting Device Access


Other tasks(2):

-Encrypt all passwords




-Provide legal notification

When choosing passwords(4):

-Use passwords that are more than 8 characters in length




-Use a combination of upper and lowercase letters, numbers, special characers, and/or numeric sequences.




-Avoid using the same password for all devices




-Don't use common words because these are easily guessed

The most important password to configure is access to the...

...privileged EXEC mode.

To secure privileged EXEC access, use the...

... enable secret password command.

To secure the user EXEC access...

... the console port must be configured. Enter line console configuration mode using theline console 0 global configuration command. The zero is used to represent the first (and in most cases the only) console interface. Next, specify the user EXEC mode password using thepassword password command.Finally, enable user EXEC access using the login command.

To secure VTY lines used for SSH and Telnet...

...enter line VTY mode using the line vty 0 15global config command, as shown in Figure 3. Many Cisco switches support up to 16 VTY lines that are numbered 0 to 15. Next, specify the VTY password using the password passwordcommand. Lastly, enable VTY access using thelogin command.

To encrypt passwords, use the ___.

service password-encryption global config command

Purpose of the service password-encryption global config command is...

...is to keep unauthorized individuals from viewing passwords in the configuration file.

Why are banners important?

It is vital to provide a method for declaring that only authorized personnel should attempt to gain entry into the device. Banners can be an important part of the legal process in the event that someone is prosecuted for breaking into a device. Some legal systems do not allow prosecution, or even the monitoring of users, unless a notification is visible.

How do you create a banner?

banner motd # the message of the day #


in global configuration

The file stored in Non-volatile Random Access Memory (NVRAM) that contains all of the commands that will be used by the device upon startup or reboot. NVRAM does not lose its contents when the device is powered off.

Startup-config

The file stored in Random Access Memory (RAM) that reflects the current configuration. Modifying a ____ affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.

running-config

To save changes made to the running configuration to the startup configuration file use the...

copy running-config startup-config


in privileged EXEC mode command.

If changes made to the running configuration do not have the desired effect and the running-config file has not yet been saved, you can restore the device to its previous configuration by removing the changed commands individually or reload the device using the...

...reload


privileged EXEC mode command

Devices Requiring IP Address(6):

-Computers (work stations. laptops, file servers, web servers)




-Network printers




-VoIP phones




-Security cameras




-Smart phones




-Mobile handheld devices(such as wireless barcode scanners)

IPv4 addresses are assigned to...

... individual devices connected to a network.

With the IPv4 address, a ____ is also necessary. A ____ is a special type of IPv4 address. Coupled with the IPv4 address, the _____ determines which particular subnet the device is a member.

subnet mask

The virtual interface provides a means to _____ a switch over a network using IPv4.

remotely manage

What are DNS IP?

The DNS server addresses are the IP addresses of the Domain Name System (DNS) servers, which are used to translate IP addresses to domain names, such aswww.cisco.com.