CCNA Flashcards

1
Q

Firewall

A

device that protects networks by montioring traffic and prevents unwanted traffic from accessing network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP (Address Resolution Protocol)

A

Translates the IP address of a device to a MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can a device act as a client and server?

A

Yes and example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

client

A

requests a service from a server. Example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS (Domain name system)

A

A protocol that translates web addresses like www.google.com to IP addresses such as 192.65.52.21. Like a phonebook for computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Home IP address

A

192.168.0.1 or 192.168.1.1

Used to connect to home network(router). This IP address is like a secret code that helps the devices in your house talk to each other and send and receive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP address (Internet Protocol address)

A

Unique address that identifies a device in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Local host

A

127.0.0.1, this is your computer itself and used for testing programs or trying out new things without anyone else seeing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mac Address (Media Access Control address)

A

AKA physical address, unique address assigned to NIC in a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network

A

A group of connected devices that share resources such as files, pictures, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Topology

A

Diagram of the arrangement of devices in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Open Systems Interconnection Model

A

7 layer model that describes how computer systems communicate over a network. (Physical, Data Link, Network, Transport, Session, Presentation, Application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

A fraudulent email that contains malware or to get sensitive data. It may seem legit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

deny a user or organization access to file unless a payment to made to hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Router

A

Router is used to send data over internet and between LANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Server

A

provides a client with a service, Example:

17
Q

Social Engineering

A

manipulating someone to perform actions or get confidential information

18
Q

Spoofing attack

A

attacker pretends to be a person, organization, etc to get confidential information. Example:

19
Q

Techniques to perform Reconnaissance Atttack

A
  1. Gather info about target and find target’s network address(whois, google, organization website, etc)
  2. Ping sweep-to find active IP addresses
    3.Port scan(Nmap, Superscan, etc)
    4.Run vulnerability scanner- with identified ports, determine the type and version of OS running on the host(Nipper, SAINT, etc)
    5.Run exploitation-discover vulnerable services that can be exploited.
20
Q

Trojan Horse

A

is a type of malware that appears legitimate and safe, but is actually malware

21
Q

Virus

A

A malicious piece of computer code designed to spread from device to device.

22
Q

What is Ethernet

A

Networking technology that is used in a wired LAN or WAN to create connections between devices using protocols.

23
Q

Static Route

A

A route that you manually configure in a routing table

24
Q

Next Hop

A

The hop data has to go through to make it to the destination

25
Q

Routing table

A

shows a list of known destinations and how to get there (show IP route command)

26
Q

Default gateway

A

a router that directs traffic where it needs to go

27
Q

Physical layer

A

Layer responsible for how data is transmitted and what medium is used to transmit it

28
Q

TCP/IP

A

TCP is used with IP to ensure reliable transmission of packets, when computers want to send data to each other via TCP/IP, a connection must be made over the internet

29
Q

UDP

A

UDP doesn’t use error checking or 3-way handshake. The packets are just sent to the recipient. This protocol is faster than TCP/IP

30
Q

What are the two routing methods?(methods routers use to learn routes)

A

Static Routing - Network Engineer manually configures routes on the router
Dynamic Routing - Routers use dynamic routing protocols such as OSPF to share info with each other automatically and build a routing table.

31
Q

OSPF (Open shortest path first)

A

Router protocol used to find the best path for packets as they pass through a set of connected networks

32
Q

Ping Sweep

A

is a technique used in computer networking to discover and identify active hosts (computers or devices) on a network. It involves sending a series of network ping requests to a range of IP addresses within a specific network or subnet

33
Q

Port Scan

A

scanning tool or software that checks different ports on a computer or device to see if they are open or closed. It sends messages, called network packets, to each port and waits for a response. Based on the response or lack thereof, it determines whether the port is open, closed, or filtered.

34
Q

vulnerability scanner

A

software tool used to check if computer systems, networks, or applications have any hidden problems or weaknesses that could make them not work properly.

35
Q

Broadcast domain

A

group of devices that will receive broadcast frame by a member in the group

36
Q

VLAN

A

A way to logically split up a broadcast domain

37
Q
A