CcEnT Flashcards
Assist in PASSING the ICND1 640-822 exam
Administration of network equipment via a GUI browser commonly uses which two protocols?
HTTP & SSL
When data is sent via TCP, which two PDUs are encapsulated into bits on the wire?
TCP Segment & IP Packet
What is the “well-known” port number range that is used in TCP and UDP as assigned by the IANA?
0-1023
What does the Show Flash command do?
Lists the files in flash memory along with the size, available space, and type of flash memory
What is the purpose of the Debug command?
It provides a flow of dynamic information about the status of a device that keeps updating.
Which Global command adds time stamps to log messages including debug messages?
service timestamps
Command used to disable an unused port?
shutdown
A VoIP call requires what kind of connection?
Low latency/delay, low jitter, no loss
What are the three VTP modes and which two allow VLANs to be added, modified, and deleted?
Server, client and transparent modes. Server & transparent allow changes to be made.
What two situations would likely cause a serial interface to have the status of’ “Serial 1 is up, line protocol is down”
No keepalives and a mismatched encapsulation type
Characteristics of TCP:
Lost or corrupted packets are retransmitted
A TCP segment contains a SEQuence # and an ACKnowledgement #
What is WEP?
Wired Equivalent Privacy is a security algorithm used in wireless networks that uses a 40 bit key. It also has a 128 bit key version. It is easily broken and not recommended for use.
In which layer of the OSI model would you begin troubleshooting problems with IP addressing?
Layer 3, the Network layer is where IP works
What is the command to associate the extended IPv4 ACL 100 to interface FastEthernet 0/0?
ip access-group 100 in Note: only one ACL per protocol, per direction and per interface is allowed.
Which ACL type is known to be the most efficient?
The inbound type because it would be closest to the origin and discard packets before consuming router resources.
What is NAT used for?
Network Address Translation is used to modify a private IP address in the IPv4 header to a public IP address while in transit across a network routing device. It protects private hosts.
Name the one or more OSI model layers that match the TCP/IP model layer 4
TCP/IP layer 4, the Application layer, maps to the OSI layers 5-7, the Session, Presentation, and Application layers.
Name the one or more OSI model layers that match the TCP/IP model layer 3
TCP/IP layer 3, the Transport layer, maps to OSI layer 4, the Transport layer.
Name the one or more OSI model layers that match the TCP/IP model layer 2
TCP/IP layer 2, the Internetworking or Internet layer, maps to OSI layer 3, the Network layer
Name the one or more OSI model layers that match the TCP/IP model layer 1
TCP/IP layer 1, the Link or Network access layer, maps to OSI layers 2 and 1, the Data Link and Physical layers.
What services does Windowing provide?
The sender can send a specified number (the window size - 1) of unacknowledged frames.
This is a good method to address physical security threats
Control server room access
Describe the basic differences between various 802.11 wireless standards
- 11a = 54Mbps max., 5GHz, OFDM
- 11b = 11Mbpsmax., 2.4GHz, DSSS
- 11g = 54Mbps max., 2.4GHz, OFDM&DSSS
- 11n = 150Mbps max, 2.4/5GHz, OFDM
This type of attack is considered an access attack
A password attack
Possible impact of poor cable management on a network?
RJ-45 connectors are stressed, causing wires to break
Purpose of the configuration register?
The configuration register is a special 16 bit number that can be set on any Cisco router. Some of the uses include specifying the location of the iOS s/w image and to help in pwd recovery