A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen?
- ssh
Which command or key combination allows a user to return to the previous level in the command hierarchy?
- End and CTRL-Z : return the user to the privileged EXEC mode.
- Ctrl-C : ends a command in process.
- exit : returns the user to the previous level.
A router has a valid operating system and a configuration file stored in NVRAM. The configuration file contains an enable secret password but no console password. When the router boots up, which mode will display?
- If a Cisco IOS device has a valid IOS and a valid configuration file, it will boot into user EXEC mode. A password will be required to enter privileged EXEC mode.
context-sensitive help feature
- displaying a list of all available commands within the current mode
- determining which option, keyword, or argument is available for the entered command
Hostnames
- It is important to configure a hostname because various authentication processes use the device hostname.
- Hostnames are helpful for documentation, and they identify the device during remote access.
Some guidelines for naming conventions are that hostnames should
- Start with a letter
- Contain no spaces
- End with a letter or digit
- Use only letters, digits, and dashes
- Be less than 64 characters in length
service password-encryption
- encrypts plaintext passwords in the configuration file so that they cannot be viewed by unauthorized users.
Refer to the exhibit. A network administrator is configuring the MOTD on switch SW1. What is the purpose of this command?
- to display a message when a user accesses the switch
- A banner message can be an important part of the legal process in the event that someone is prosecuted for breaking into a device.
- A banner message should make it clear that only authorized personnel should attempt to access the device.
- However, the banner command does not prevent unauthorized entry.
While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM?
- The solution is to reboot the router without saving the running configuration.
- The copy startup-config running-config command does not overwrite the running configuration file with the configuration file stored in NVRAM, but rather it just has an additive effect.
Which statement is true about the running configuration file in a Cisco IOS device?
- As soon as configuration commands are entered into a router, they modify the device immediately.
- Running configuration files can not be deleted nor are they saved automatically.
Which interface allows remote management of a Layer 2 switch?
- In a Layer 2 switch, there is a switch virtual interface (SVI) that provides a means for remotely managing the device.
interface
- An SVI is a virtual interface and VLAN 1 is enabled by default on Cisco switches.
- FastEthernet 0/1 and GigabitEthernet 0/1 are physical interfaces.
Why would a Layer 2 switch need an IP address?
- A switch, as a Layer 2 device, does not need an IP address to transmit frames to attached devices.
- However, when a switch is accessed remotely through the network, it must have a Layer 3 address.
- The IP address must be applied to a virtual interface rather than to a physical interface.
- Routers, not switches, function as default gateways.
An administrator is configuring a switch console port with a password. In what order will the administrator travel through the IOS modes of operation in order to reach the mode in which the configuration commands will be entered?
- first mode : user EXEC mode
- second mode : privilieged mode
- third mode : global configuation mode
- final mode : line configuration mode
CLI hot keys
- aborts commands such as trace and ping : Ctrl-Shift 6
- display the next screen : spacebar
'네트워크 > CCNA' 카테고리의 다른 글
[CCNA] CCNA1 - Chapter5 (0) | 2022.10.07 |
---|---|
[CCNA] CCNA1 - Chapter4 (0) | 2022.10.06 |
[CCNA] CCNA1 - Chapter3 (0) | 2022.10.05 |
[CCNA] CCNA1 - Chapter1 (0) | 2022.10.04 |