Chapter 5 Flashcards

1
Q

What port uses SSH/ TelNet/ NTP

A

22/ 23 , 992 / 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What port uses DNS, HTTPS, NETCONF, RESCONF

A

53/ 443/ 830/ 8008, 8080, 8888

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Benefits of usign DHCP

A

-Reduced client configuration tasks and costs

-Centralized management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

**What port uses DHCP **

A

Client 67/ Server 68

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A protocol defines an automated service that matches domain names to IP addresses

A

DNS (Domain Name Service)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Was developed to allow administrators to manage devices such as servers, workstations, routers, switches, and security appliances.

A

Simple Network Manager Protocol (SNMP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The SNMP system consists of three elements:

A

SNMP manager: network management system (NMS)

SNMP agents (managed device)

Management Information Base (MIB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Collects and stores information about the device and its operation. This information is stored locally by the agent in the MIB.

A

SNMP Agents

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Are unsolicited messages alerting the SNMP manager to a condition or event on the network.

A

SNMP Traps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Are data structures that describe SNMP network elements as a list of data objects.

A

Manage Information Base (MIB)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Accurate time and making sure all devices in the network have a uniform and correct view of time has always been a critical component to ensuring a smooth operation of the infrastructure

A

Network Time Protocol (NTP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

NTP servers can associate in several modes, including:

A

Client/Server
Symmetric Active/Passive
Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Types of Network Autentication Translation (NAT) include:

A

Static address translation (static NAT) – This is one-to-one mapping between global and local IPv4 addresses.

Dynamic address translation (dynamic NAT) – This maps registered IPv4 addresses from a pool to registered IP addresses.

Overloading (also called Port Address Translation or PAT) – This maps many unregistered IPv4 addresses to a single registered address (many to one) on different ports. Through overloading, thousands of users can be connected to the internet by using only one real global IP address.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

These are two common IPv6 assigned multicast groups:

A

ff02::1 All-nodes multicast group

ff02::2 All-routers multicast group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Prefix to identify unicast IP6 address

A

FC00::/7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

There are three packet-forwarding mechanisms supported by routers

A

Process switching
Fast switching
Cisco Express Forwarding CEF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

This stateless packet filtering (Firewall) can be based on several packet header fields, including the following:

A

Source and/or destination IP address

IP protocol ID
	
Source and/or destination TCP or UDP Port number
	
ICMP message type
	
Fragmentation flags
	
IP option settings
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Firewall. You create static rules that permit or deny packets, based on packet header information.

A

Stateless Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

firewall performs the same header inspection as the stateless packet filtering firewall but also keeps track of the connection state. This is a critical difference. To keep track of the state, these firewalls maintain a state table.

A

Stateful Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Can perform deep inspection of the packet all the way up to the OSI model’s Layer 7.

A

Application Layer Packet Filtering

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

**Improves the distribution of workloads across multiple computing resources, such as servers, cluster of servers, network links, and more. **

A

Load Balancers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

At the device level, the load balancer provides the following features to support high network availability:

A
  • Device Redundacy
  • Scalability
  • Security
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

At the network service level, a load balancer provides the following advanced services:

A

-High services availability
-Scalability
-Services-level security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

You can distribute incoming client requests among the servers in a server farm by defining load-balancing rules called?

A

Predictors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Load balancers can be configured to track the health and performance of servers and server farms by creating?

A

Health proves

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Data Encapsulation at Each Layer of the TCP/IP model, Protocol Data Unit (PDU)

Application Layer
Transpor Layer
Network Layer
Data Link Layer
Phisical Layer

A

Data
Segment
Packet
Frame
Bits

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

OSI model layers:

A

Application Layer 7
Presentation (Layer 6)
Session (Layer 5)
Transport (Layer 4)
Network (Layer 3)
Data Link (Layer 2)
Physical (Layer 1)

28
Q

Data Link Layer (Layer 2) subdivides in:

A

Medium Access Control (MAC) sublayer

Logical Link Control (LLC) sublayer

29
Q

The Ethernet frame format is…

A

Preamble
Start of frame delimiter (SFD)
Destination MAC Address
Source MAC Address
Type
Data
Frame Check Sequence (FCS)

30
Q

This is a 1-byte field that marks the end of the preamble and indicates the beginning of the Ethernet frame.

A

Start of frame delimiter (SFD)

31
Q

This field contains a code that identifies the network layer protocol. For example, if the network layer protocol is IPv4 then this field has a value of 0x0800 and for IPv6 it has a value of 0x086DD.

A

EtherType

32
Q

includes a checking mechanism to ensure that the packet of data has been transmitted without corruption.

A

Frame Check Sequence (FCS)

33
Q

command-line utility used for querying DNS to obtain domain name to IP address mapping

A

nslookup

34
Q

is an IPv6 similar to a public IPv4 address.

A

global unicast address (GUA)

35
Q

**The parts of the global unicast address IPv6 (GUA) are **

A

Global Routing Prefix

Subnet ID

Interface ID

36
Q

FE80::/10

A

Link-Local Addresses prefix IPv6

37
Q

A routing table may contain the following types of entries:

A

Directly connected networks
Static routes
Dynamic routes
Default routes

38
Q

**Which two statements are true about NTP servers in an enterprise network? **

A

Network Time Protocol (NTP) serves at stratum 1 are directly connected to an autorative time source.

NTP servers ensure an accurate tiem stamp on logging and debugging information.

39
Q

Describe a stateful firewall….

A

It can determine if the conection is in the initiation, data transfer, or termination phase.

40
Q

Which impact does adding a Layer 2 switch have on a network?

A

An increase in the size of the broadcast domain.

41
Q

What is the function of the Manage Information Base (MIB)

A

To store data about a device.

42
Q

Which OSI layer is responsible for establishing an end-to-end connection between the
sender and the receiver?
a. Network layer
b. Transport layer
c. Session layer
d. Presentation layer

A

B

43
Q

What layer of the TCP/IP reference model is the equivalent of the network layer in the
OSI model?
a. Physical layer
b. Data link layer
c. Internet layer
d. Transport layer

A

C

44
Q

Which of the following are examples of application layer protocols in the TCP/IP reference
model? (Choose two.)
a. TCP
b. HTTP
c. BGP
d. FTP

A

B,D

45
Q

What is the transport layer PDU called in the TCP/IP reference model?
a. Data
b. Frame
c. Packet
d. Segment

A

D

46
Q

What is the role of the Preamble field in the Ethernet header?

a. It is used as padding data to ensure that the frame has at least the minimum number
of bytes for transmission.
b. It is used as padding data to ensure that the frame has 1500 bytes for
transmission.
c. It is used to ensure that the frame was transmitted without data corruption.
d. It is used to synchronize the signal between the sender and receiver.

A

D

47
Q

How many bits are in a MAC address?

a. 24 bits
b. 48 bits
c. 32 bits
d. 64 bits

A

B

48
Q

What happens to a data frame for which a switch doesn’t have the destination MAC
address in its switching table?

a. It gets discarded.
b. It gets transformed into a broadcast data frame.
c. It gets sent back to the sender as it cannot be switched.
d. It gets flooded out all the ports except the port on which it was received.

A

D

49
Q

What is the bit pattern in the first byte for Class C IPv4 addresses?
a. 110xxxxx
b. 11110xxx
c. 10xxxxxx
d. 1110xxxx

A

A

50
Q

What is the broadcast address for the 192.168.0.96/27 network?

a. 192.168.0.191
b. 192.168.0.159
c. 192.168.0.127
d. 192.168.0.255

A

C

51
Q

What are some of the characteristics of IPv6 addresses? (Choose three.)

a. They are 128 bits long.
b. Colons separate 16-bit hexadecimal fields.
c. Hexadecimal characters are case sensitive.
d. Successive fields of zero can be represented as ::.

A

A,B,D

52
Q

Ethernet is a ________ network topology.
a. star
b. ring
c. bus
d. mesh

A

A

53
Q

-________-area networks usually use public networks like telephone, cellular, or satellite
networks.

a. Metropolitan
b. Local
c. Wide
d. Campus

A

C

54
Q

Which of the following is the least secure in terms of privacy of the user?

a. Router
b. Hub
c. Switch
d. Bridge

A

B

55
Q

Which of the following is not true of a Layer 3 switch?

a. It uses IP addresses for forwarding.
b. A VLAN can be implemented by using this type of switch.
c. A Layer 3 switch creates a single broadcast domain.
d. A Layer 3 switch usually supports Layer 2 switching as well.

A

C

56
Q

Which of the following can be used to segment a physical switch into multiple logical
networks?

a. Bridge
b. WAN
c. VLAN
d. Router

A

C

57
Q

FIB tables, which contain precomputed routes, reverse lookups, and so on, are used in
which type of switching?

a. Process switching
b. Cisco Express Forwarding
c. Fast switching
d. None of the above

A

B

58
Q

What is NAT used for?

a. Stopping local traffic from reaching the public network
b. Mapping private IP addresses to public IP addresses
c. Detecting traffic patterns
d. Assigning IP addresses to local network clients

A

B

59
Q

In a network controller, which plane is concerned with administrative access to a network
device?

a. Control
b. Management
c. Data
d. Hardware

A

B

60
Q

In a Cisco SD-WAN solution, what is the main brain of the entire solution that manages
the control plane?

a. vManage
b. vSmart
c. vEdge
d. vBond

A

B

61
Q

What are some of the benefits that DHCP offers? (Choose two.)

a. Reduced network endpoint configuration tasks and costs
b. Elimination of single points of failure for network parameter configuration
c. Decentralized management of network configuration
d. Centralized management of network parameters configuration

A

A,D

62
Q

What DNS component is configured on a network client?

a. Root server
b. TLD server
c. DNS resolver
d. TLC server

A

C

63
Q

What are some of the benefits of Network Address Translation? (Choose three.)

a. Conserving public IP address space
b. Increased security due to hiding of internal addressing
c. Loss of end-to-end traceability and visibility
d. Loss of end-to-end functionality
e. Flexibility when changing ISPs

A

A,B,E

64
Q

What version of SNMP was developed with a security focus in mind?

a. SNMPv3
b. SNMPv1
c. SNMPv2c
d. SNMPv4

A

A

65
Q

What transport layer protocol and port are used by NTP?

a. TCP 123
b. TCP 120
c. UDP 120
d. UDP 123

A

D

66
Q

What network devices should be included in a Layer 3 diagram?

a. Switches, routers, and firewalls
b. Routers, firewalls, and load balancers
c. Switches, firewalls, and load balancers
d. Bridges, switches, and hubs

A

B

67
Q

What popular network utility is used to troubleshoot DNS issues?

a. traceroute
b. dnslookup
c. nslookup
d. ping

A

C