characteristics of fault tolerant network - ANSWER Redundancy
Qos mechanisms for priorities - ANSWER With a QoS policy in place, the router can manage
... [Show More] the flow of data and voice traffic, giving priority to voice communications if the network experiences congestion.
Benefits of using cloud computing - ANSWER can be accessed from anywhere, less space, cheaper, lower overhead
function of the shell in an OS - ANSWER to act as an intermediary between user and OS through GUI or CLI
SSH - ANSWER Secure Shell (SSH) - SSH is a method for remotely establishing a secure CLI connection through a virtual interface, over a network. Unlike a console connection, SSH connections require active networking services on the device including an active interface configured with an address.
SSH is the recommended method for remote management because it provides a secure connection. SSH provides encrypted password authentication and transport of session data. This keeps the user ID, password, and the details of the management session private. Most versions of Cisco IOS include an SSH server and an SSH client that can be used to establish SSH sessions with other devices.
modes of operation - ANSWER User EXEC Mode ">" This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device. The user EXEC mode is identified by the CLI prompt that ends with the > symbol.
Privileged EXEC Mode "#" To execute configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes, like global configuration mode, can only be reached from privileged EXEC mode. The privileged EXEC mode can be identified by the prompt ending with the # symbol.
Ctrl-Shft-6 key command - ANSWER All purpose break sequence. used to abort DNS lookups, traceroutes and pings.
interface VLAN1 - ANSWER Cisco IOS Layer 2 switches have physical ports for devices to connect. These ports do not support Layer 3 IP addresses. Therefore, switches have one or more switch virtual interfaces (SVIs). These are virtual interfaces because there is no physical hardware on the device associated with it. An SVI is created in software. [Show Less]