Name __________________________________________________________ Date ________________ Chapter 2 – Configuring a Network Operating System Study Guide Tips for success: While answering the questions read Chapter 2 and review the summary. All answers should be in RED type After completion of this chapter, you should be able to: Explain the purpose of Cisco IOS. Explain how to access and navigate Cisco IOS to configure network devices. Describe the command structure of Cisco IOS software. Configure hostnames on a Cisco IOS device using the CLI. Use Cisco IOS commands to limit access to device configurations. Use Cisco IOS commands to save the running configuration. Explain how devices communicate across network media. Configure a host device with an IP address. Verify connectivity between two end devices. 1. What is the purpose of an Operating System? Series of programs and code that creates an interface so users can interact with a systems hardware. 2. Explain the function of the kernel. Core portion of program that resides in memory and performs the most essential operating systems takes 3. What are the different ways a user can access the Cisco IOS? CLI and GUI 4. Give an example of commands or tasks that can be done in each mode: a. User Exec –useful for basic operations EXEC mode is identified by the CLI prompt that ends with the > symbol. b. Privilege Exec – To execute configuration commands, a network administrator must access privileged EXEC mode. by the prompt ending with the # symbol. c. Global –CLI configuration changes are made that affect the operation of the device. identified by a prompt that ends with (config)# d. Line –Used to configure console, SSH, Telnet, or AUX access. e. Router –Used to configure a switch port or router network interface. 5. What command is used to go from User to Privilege mode? Enable 6. What command is used to go from Privilege to User mode? Disable 7. What is the purpose of using the “show” command? Give three examples of how it is used. show ip interface brief command. This command is useful for verifying the condition of the switch interfaces. show running-config or show startup-config command at the privileged EXEC prompt. Text displayed in the terminal window will be placed into the chosen file. 8. List some best practices when naming network devices: make sure the documentation is updated each time a device is added or modified. Identify devices in the documentation by their location, purpose, and address. IST 166 – Network Fundamentals Page 1 Luse – Spring 2018 9. Name the characteristics of RAM on a Cisco device. RAM is volatile memory. It loses all of its content when the device is powered off or restarted. 10. What command is used on a Windows PC to see the network configuration of that computer ipconfig \all 11. Explain the purpose of DHCP.IS used to configured to obtain an IP address automatically, your computer boots up and will broadcast a DHCP request. 12. What is the ping command used for? The ping command can be used to test connectivity to another device on the network or a website on the Internet. 13. What is the purpose of each of the following passwords; write out the syntax used to set up each. a. Console b. Enable c. Enable secret d. VTY 14. What command is used to encrypt all passwords? enable password [level level] {password | [encryptiontype] encrypted-password} 15. Compare and Contrast: Startup-Config The file stored in Non-volatile Random Access Memory (NVRAM) that contains all of the commands that will be used by the device upon startup or reboot. NVRAM does not lose its contents when the device is powered off. Running-Config The file stored in Random Access Memory (RAM) that reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted. 16. What command is used to save the current config file you are working on to NVRAM? _________________ Startup config 17. What is the role of IP Addresses on routers, specifically the address assigned to the Ethernet Interfaces? the primary means of enabling devices to locate one another and establish end-to-end communication on the Internet 18. What is the purpose of assigning an IP Address to VLAN 1 on a Switch? To access the switch remotely, an IP address and a subnet mask must be configured on the SVI. 19. What are the benefits of using DHCP on a network, verses manually configuring devices? DHCP automatically gets all the Ip address that are needed without having to input them manually IST 166 – Network Fundamentals Page 2 Luse – Spring 2018