CCNA Flashcards

1
Q

Firewall

A

device that protects networks by montioring traffic and prevents unwanted traffic from accessing network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

ARP (Address Resolution Protocol)

A

Translates the IP address of a device to a MAC address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Can a device act as a client and server?

A

Yes and example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

client

A

requests a service from a server. Example

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS (Domain name system)

A

A protocol that translates web addresses like www.google.com to IP addresses such as 192.65.52.21. Like a phonebook for computers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Home IP address

A

192.168.0.1 or 192.168.1.1

Used to connect to home network(router). This IP address is like a secret code that helps the devices in your house talk to each other and send and receive data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

IP address (Internet Protocol address)

A

Unique address that identifies a device in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Local host

A

127.0.0.1, this is your computer itself and used for testing programs or trying out new things without anyone else seeing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Mac Address (Media Access Control address)

A

AKA physical address, unique address assigned to NIC in a device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Network

A

A group of connected devices that share resources such as files, pictures, etc.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Network Topology

A

Diagram of the arrangement of devices in a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Open Systems Interconnection Model

A

7 layer model that describes how computer systems communicate over a network. (Physical, Data Link, Network, Transport, Session, Presentation, Application)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Phishing

A

A fraudulent email that contains malware or to get sensitive data. It may seem legit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Ransomware

A

deny a user or organization access to file unless a payment to made to hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Router

A

Router is used to send data over internet and between LANS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Server

A

provides a client with a service, Example:

17
Q

Social Engineering

A

manipulating someone to perform actions or get confidential information

18
Q

Spoofing attack

A

attacker pretends to be a person, organization, etc to get confidential information. Example:

19
Q

Techniques to perform Reconnaissance Atttack

A
  1. Gather info about target and find target’s network address(whois, google, organization website, etc)
  2. Ping sweep-to find active IP addresses
    3.Port scan(Nmap, Superscan, etc)
    4.Run vulnerability scanner- with identified ports, determine the type and version of OS running on the host(Nipper, SAINT, etc)
    5.Run exploitation-discover vulnerable services that can be exploited.
20
Q

Trojan Horse

A

is a type of malware that appears legitimate and safe, but is actually malware

21
Q

Virus

A

A malicious piece of computer code designed to spread from device to device.

22
Q

What is Ethernet

A

Networking technology that is used in a wired LAN or WAN to create connections between devices using protocols.

23
Q

Static Route

A

A route that you manually configure in a routing table

24
Q

Next Hop

A

The hop data has to go through to make it to the destination

25
Routing table
shows a list of known destinations and how to get there (show IP route command)
26
Default gateway
a router that directs traffic where it needs to go
27
Physical layer
Layer responsible for how data is transmitted and what medium is used to transmit it
28
TCP/IP
TCP is used with IP to ensure reliable transmission of packets, when computers want to send data to each other via TCP/IP, a connection must be made over the internet
29
UDP
UDP doesn't use error checking or 3-way handshake. The packets are just sent to the recipient. This protocol is faster than TCP/IP
30
What are the two routing methods?(methods routers use to learn routes)
Static Routing - Network Engineer manually configures routes on the router Dynamic Routing - Routers use dynamic routing protocols such as OSPF to share info with each other automatically and build a routing table.
31
OSPF (Open shortest path first)
Router protocol used to find the best path for packets as they pass through a set of connected networks
32
Ping Sweep
is a technique used in computer networking to discover and identify active hosts (computers or devices) on a network. It involves sending a series of network ping requests to a range of IP addresses within a specific network or subnet
33
Port Scan
scanning tool or software that checks different ports on a computer or device to see if they are open or closed. It sends messages, called network packets, to each port and waits for a response. Based on the response or lack thereof, it determines whether the port is open, closed, or filtered.
34
vulnerability scanner
software tool used to check if computer systems, networks, or applications have any hidden problems or weaknesses that could make them not work properly.
35
Broadcast domain
group of devices that will receive broadcast frame by a member in the group
36
VLAN
A way to logically split up a broadcast domain
37