CCNA Discovery 2, Chapter 5. "Configuring Network Devices ...

soggychickNetworking and Communications

Jul 13, 2012 (5 years and 4 months ago)

1,075 views

CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

1


Name:

1.

D
escribe

what an ISR is and why it is a good choice for small to medium
-
sized
businesses:







2.


Describe each
:

a.

Cisco IOS



b.


IP Base Image



c.


RJ45
-
to
-
DB9 console cable



d.


DB
-
9
-
to
-
DB
-
25 modem adapter



3.


What
tools
are
required to install a new
Cisco I
SR
device
?






CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

2


4.

List the
steps to perform a power up procedure on an 1841 ISR:







5.


Explain the difference between two possible methods to connect a PC to a
network device for configuration and monitoring tasks:








6.


Define and explain the following:

a.

Cisco Router and Security Device Manager (SDM)



b.

SDM Express




CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

3


7.


Summarize the main differences between the Cisco IOS CLI and the Cisco
SDM:






8.

Explain the Running Configuration file and the Startup Configuration and the
purpose of each:







9.

When a Cis
co router is first powered on, it loads the IOS to working memory.
Next, the startup configuration file is copied from
_______

to
______ .

10.


Cisco CLI uses the command
______________________________________

to save the router's running configuration to the

startup configuration.

11.


Do Packet Tracer Activity 5.1.5.

12.


A
____________________________ is used to
connect networks that are
separated by large geographic distances.





CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

4


13.


Explain each of the following Serial Encapsulation types:

a.

HDLC



b.. Frame Relay



b.


PPP



14.


Print and complete Lab 5.2.3 and submit it.

15.


Print and complete Lab 5.2.5 and submit it.

16.


Explain each:

a.

User EXEC access


b.


Privileged EXEC access



17.


Commands that can be executed in user EXEC mode are limited to obtaining
information about how t
he device is operating and troubleshooting using
_____

or
_______________
.




CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

5


18.

To enter commands that can alter the operation of the device requires
_______________

level access. Enable the privileged EXEC mode by entering
______________
at the command promp
t and pressing Enter. The command line
prompt changes to reflect the mode change. The prompt for the privileged mode
is
_____________
. To disable the privileged mode and return the device to user
mode, enter
___________

or
____________

at the command promp
t.

19.


To obtain access to the configuration commands, first enter the mode that
allows access to these commands. In most cases, commands will be configured
to the running configuration file from the terminal. To access these commands,
the user must enter gl
obal configuration mode. To enter global configuration,
type the command:
_________________________

or
_________________
.

20.


Be sure to do the E
-
Lab 5.3.1!!!


21.

The
__________________

is full of features that help in recalling commands
needed to configure a d
evice. These features are one reason why network
technicians prefer to use the
_______________________

to configure routers.

22.

The context
-
sensitive help feature is especially useful when configuring a device.
Entering _______ or the ________ at the command
prompt displays a brief
description of the help system.

23.

The appearance of
_________

indicates that the command is now complete.
Press the enter key to enter the command. If a
_______

is entered and nothing
matches, the help list will be empty. This indicat
es that the command string is not
a supported command.

24.

What does the appearance of the
%

symbol indicate?



25.


What does the error message
%Invalid input detected

tell you?



26.


What does the caret symbol (
^
) tell you?


CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

6


27.


What command would you type
to recall p
reviously typed commands
?


28.

To change the number of command lines the system records during a terminal
session, use the
_______________________

or the
____________________

command. The maximum number of commands is
_________
.


29.

To recall the most recent comm
and in the history buffer, press
_________

or the
_____________

key.


30.

To return to a more recent command in the history buffer, press
____________

or the
____________

key.


31.

Do Packet Tracer Activity 5.3.2


32.

The Cisco IOS CLI enables a user to display releva
nt information about the
configuration and operation of the device. To obtain this information,
__________

commands are used.


33.

List six often
-
used commands of the type referred to in the previous question:








CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

7


34.


Do E
-
Lab 5.3.3

35.

Do Packet Tracer Activity 5
.3.3

36.

What type of memory is used to store the startup configuration file of the device?


37.


To view the contents of the startup configuration file, use the command:


38.

What type of memory is used to store the running configuration file of the device?


39.

To view
the current running configuration use the command:


40.

Explain how changes to the running configuration are saved:





41.


A device should be given a unique name as one of the first configuration tasks.
This task is accomplished in
______________________________
____

mode
with the following command:


42.


Explain the difference between the
enable

password and the
enable secret

password:





CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

8


43.


To set the password for console connection access, first enter
_______________________

mode. Once there, use the following comma
nd
s
:





44.


Once the device is connected to the network, it can be accessed over the
network connection. When the device is accessed through the network, it is
considered a
__________________________

connection. The password must
be configured on the virtual

port

with the following commands:





45.


The command
________________________________

will ensure that
all
passwords are encrypted.

46.

Do Packet Tracer Activity 5.3.4

47.

What must be configure
d

on the DCE end of a WAN (serial) link?


48.


What is the purpose of what
is referred to in the previous question?



49.


To configure any interface on the router, it is necessary to be in
______________________________________
mode.



CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

9


50.


List the steps to configure and interface:





51.


What is the command to enable an interface?



52.


Why

are interfaces disabled by default?



53.


Do E
-
Lab 5.3.5

54.

Do
Packet Tracer Activity

5.3.5

55.

Print and complete Lab 5.3.5 and turn it in.

56.

What is the purpose of configuring a default route?



57.


List two ways to configure a default route:







CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

10


58.


Do Packet Tracer A
ctivity 5.3.6

59.

List and briefly explain each of the eight basic steps to configure DHCP:

















60.


Do Packet Tracer Activity 5.3.7

61.

Explain
what NAT is and why it is used:





CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

11


62.


List and explain each of the eight steps involved in configuring NAT and s
tatic
NAT:





















63.


Do Packet Tracer Activity 5.3.8


CCNA Discovery
2
, Chapter
5
. “
Configuring Network Devices


Worksheet

#
1

A
MHS

CISCO Networking Academy

M
ike Fawcett
, Instructor

12


64.


Print and complete Lab 5.3.8 and turn it in.


65.

Why would it be a good idea to save your configuration file in another location,
such as a network server?




66.


Define the TFTP protocol:



67.


List

the steps and commands to save a configuration file to a TFTP server:








68.


List the steps and commands to restore a configuration file from a TFTP server: