CCNA 1 - Module 1 & 2 Flashcards

1
Q

– end device / clients

A

Host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

– number that identifies the host within a particular network. It identifies the host and the network to which the host is attached.

A

Internet protocol (ip) address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

– computers with software that allow them to provide information, like email or web pages, to other end devices on the network

A

Servers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

TYPES OF SERVER SOFTWARE

A
  • email server
  • web server
  • file server
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

– runs email server software (ms outlook, gmail, etc)

A

email server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

– runs web server software (internet explorer, chrome)

A

Web server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

– stores corporate and user files in a central location (file explorer)

A

File server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

– many computers function as the servers and clients on the network

A

Peer-to-peer network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

– is either the source or destination of a message transmitted over the network.

A

End device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

– connect the individual end devices to the network.

A

Intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

– also known as a multiport repeater.

A

Ethernet hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

– provides the channel over which the message travels from source to destination.

A

Network media

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

THREE TYPES OF MEDIA

A
  • metal wires (copper) within cables
  • glass/plasiting fibers within cables (fiber-optic-cable)
  • wireless transmission
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  • – data is encoded into electrical impulses.
A

Metal wires (copper) within cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q
  • – data is encoded into Pulses of light.
A

Glass or plastic fibers within cables (fiber-optic-cable)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
  • – data is encoded via modulation of specific frequencies of electromagnetic waves.
A

Wireless transmission

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

– use symbols, like those shown in the figure, to represent the different devices and connections that make up a network.

A

Network representation / diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q
  • – physically connects the end device to the network.
A

Network interface card (nic)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
  • – a connector or outlet on a networking device where the media connects to an end device or another networking device.
A

Physical port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  • – specialized ports on a networking device that connect to individual
A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

– visual map of how the network is connected.

A

Topology diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TWO TYPES OF TOPOLOGY DIAGRAM

A
  • physical td
  • logical td
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  • – illustrate the physical location of intermediary devices and cable installation
A

Physical topology diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • – illustrate devices, ports, and the addressing scheme of the network.
A

Logical topology diagram

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q
  • – connect a few computers to each other and to the internet.
A

Small home networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q
  • – allows computers in a home office or a remote office
A

Small office and home office networks (soho)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q
  • – school / corp. Can have many locations with hundreds or thousands of interconnected hosts.
A

Medium to large networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  • – provides access to users and end devices in a small geographical area.
A

Local area networks (LANS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q
  • – the internet is a network of networks that connects hundreds of millions of computers world-wide.
A

Worldwide networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q
  • – provides access to other networks over a wide geographical area
A

Wide area networks (WANS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

– worldwide collection of interconnected networks (internetworks, or internet for short)

A

Internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

– a private connection of LANS and WANS that belongs to an organization.

A

Intranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

– provide secure and safe access to individuals who work for a different organization but require access to the organization’s data.

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q
  • data signal transmits on the same cable that delivers cable television it provides a high bandwidth, high availability, and an always-on connection to the internet.
A

Cable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

– also provide high bandwidth, high availability, and an always-on connection to the internet. DSL runs over a telephone line

A

Digital subscriber lines (DSL)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

– uses a cell phone network to connect.

A

Cellular

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

– benefit in those areas that would otherwise have no internet connectivity at all

A

Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

– an inexpensive option that uses any phone line and a modem. The low bandwidth provided

A

Dial-up telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

– reserved circuits within the service provider’s network that connect geographically separated offices for private voice and/or data networking.

A

Dedicated leased line

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

– ethernet wan. It extends LAN access technology into the wan. Ethernet is a LAN technology you will learn about in a later module.

A

Metro ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

– popular choice is symmetric digital subscriber line (SDSL) which is like the consumer version of DSL but provides uploads and downloads at the same high speeds.

A

Business DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

– it can provide a connection when a wired solution is not available.

A

Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

– could not communicate with each other since they use different technologies to carry the communication signal and had their own set of rules and standards.

A

Traditional Separate Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

– capable to communicate with each other since they use the same network infrastructure and uses the same set of rules and standards.

A

Converged Networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q
  • – it limits the number of affected devices during a failure. It is built to allow quick recovery when such a failure occurs.
A

Fault tolerance

45
Q

o - having multiple paths to a destination

A

Redundancy

46
Q

o – is one way that reliable networks provide redundancy. Packet switching splits traffic into packets that are routed over a shared network

A

Packet switching

47
Q

o – a single message, such as an email or a video stream, is broken into multiple message blocks.

A

Packets

48
Q
  • – it expands quickly to support new users and applications.
A

Scalability

49
Q
  • – is an increasing requirement of networks today. New applications available to users over networks, such as voice and live video transmissions, create higher expectations for the quality of the delivered services.
A

Quality of service (QoS)

50
Q

o – occurs when the demand for bandwidth exceeds the amount available, measured in bits per seconds.

A

Congestion

51
Q
  • – network infrastructure security and information security
A

Security

52
Q
  • – only the intended and authorized recipients can access and read data.
A

Confidentiality

53
Q
  • – it assures users that the information has not been altered in transmission, from origin to destination.
A

Integrity

54
Q
  • – it assures users of timely and reliable access to data services for authorized users.
A

Availability

55
Q
  • – it is a concept that requires significant changes to the way we use devices and safely connect them to networks.
A

Bring your own device (BYOD)

56
Q
  • – the act of working with another or others on a joint project
A

Collaboration

57
Q

 – is a multifunctional collaboration tool that lets you send instant messages to one or more people, post images, and post videos and links.

A

Cisco WebEx teams

58
Q
  • – is a powerful tool for communicating with others, both locally and globally.
A

Video conferencing

59
Q
  • – is one of the ways that we access and store data.
A

Cloud computing

60
Q
  • – cloud made available for general population
A

Public cloud

61
Q
  • – intended for specific organizations or entity such as government
A

Private cloud

62
Q
  • – made up of two or more clouds
A

Hybrid cloud

63
Q
  • – created exclusively for specific entities or organizations.
A

Community clouds

64
Q

– integrates into every-day appliances, which can then connect with other devices to make the appliances more ‘smart’ or automated.

A

Smart home technology

65
Q

– uses existing electrical wiring to connect devices, especially useful when wireless access points cannot reach all the devices in the home.

A

Powerline networking

66
Q

– is an isp that connects subscribers to a designated access point or hot spot using similar wireless technologies found in home wireless local area Networks (WLANS).

A

Wireless internet service provider

67
Q

– it uses the same cellular technology as a smart phone.

A

Wireless broadband service

68
Q

– is an integral part of computer networking, regardless of whether the network is in a home with a single connection to the internet or is a corporation with thousands of users.

A

Network security

69
Q
  • – these contain malicious software or code running on a user device.
A

Viruses, worms, and trojan horses

70
Q
  • – these are types of software which are installed on a user’s device. The software then secretly collects information about the user.
A

Spyware and adware

71
Q
  • – it is also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
A

Zero-day attacks

72
Q
  • – is a malicious person attacks user devices or network resources.
A

Threat actor attacks

73
Q
  • – slow or crash application and processess on a network device
A

Denial of service attacks

74
Q
  • – captures private information from an organization’s network.
A

Data interception and theft

75
Q
  • – steals the login credentials of a user in order to access private data
A

Identity theft

76
Q
  • – application that help to protect end devices from becoming infected with malicious software.
A

Antivirus and antispyware

77
Q
  • – blocks unauthorized access into and out of the network.
A

Firewall filtering

78
Q
  • – this provide more advanced firewall capabilities that can filter large amounts of traffic with more granularity.
A

Dedicated firewall systems

79
Q
  • – further filter access and traffic forwarding based on ip addresses and applications.
A

Access control lists (ACL)

80
Q
  • – identify fast-spreading threats, such as zero- day or zero-hour attacks.
A

Intrusion prevention system (IPS)

81
Q
  • – provide secure access into an organization for remote workers.
A

Virtual private network (VPN)

82
Q
  • The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces.
A

Shell

83
Q
  • Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
A

Kernel

84
Q
  • The physical part of a computer including underlying electronics.
A

Hardware

85
Q
  • Windows, macOS, Linux KDE, Apple iOS, or Android
A

Graphical User Interface (GUI)

86
Q
    • less resource intensive and very stable when compared to a GUI.
A

Command Line interface (CLI)

87
Q
    • The family of network operating systems used on many Cisco devices
A

Cisco Internetwork Operating System (IOS)

88
Q

(e.g., the Cisco IOS on a switch or router) enables a network technician to do the following:

A

A CLI-based network operating system

89
Q
    • physical management port that provides out-of-band access (access via a dedicated management channel that is used for device maintenance purposes only) to a Cisco device
A

Console

90
Q
    • in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.
A

Secure Shell (SSH)

91
Q
    • insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network.
A

Telnet

92
Q
  • Mode allows access to only a limited number of basic monitoring commands.
  • often referred to as “view-only” mode.
A

User EXEC Mode

93
Q
  • To execute configuration commands (global configuration mode), a network administrator must access privileged EXEC mode
A

Privileged EXEC Mode (enable mode.)

94
Q
  • identified by a prompt that ends with (config)# after the device name, such as Switch(config)#.
A

Global Configuration Mode (Global Config Mode)

95
Q
    • Used to configure console, SSH, Telnet, or AUX access.
A

Line Configuration Mode

96
Q
    • Used to configure a switch port or router network interface.
A

Interface Configuration Mode

97
Q
  • To move from user EXEC mode to privileged EXEC mode
A

enable command

98
Q
  • to return to user EXEC mode.
A

disable privileged EXEC mode command

99
Q
  • To move in and out of global configuration mode
A

configure terminal privileged EXEC mode command

100
Q
  • To return to the privileged EXEC mode
A

exit global config mode command

101
Q

followed by the management line type and number you wish to access- to enter line subconfiguration mode

A

line command

102
Q
  • to exit a subconfiguration mode and return to global configuration mode
A

exit command

103
Q
  • To move from any subconfiguration mode to the privileged EXEC mode
A

end command (Ctrl+Z)

104
Q
  • – This is a specific parameter defined in the operating system (in the figure, ip protocols).
A

Keyword

105
Q
    • This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5).
A

Argument

106
Q

_____________ help enables you to quickly find answers to these questions:
* Which commands are available in each command mode?
* Which commands start with specific characters or group of characters?
* Which arguments and keywords are available toparticular commands?

A

Context-sensitive

107
Q

check verifies that a valid command was entered by the user.

A

Command syntax

108
Q
  • is important to warn unauthorized personnel from attempting to access the device.
A

A banner message

109
Q
    • This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose itscontents when the device is powered off.
A

startup-config

110
Q
    • This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
A

running-config