Cisco 1,2, 3,4 Flashcards
All end devices and network devices require an
Operating Systems (OS)
The user can interact with the shell using a
command-line interface (CLI) or a graphical user interface (GUI).
The user interface that allows users to request specific tasks from the computer. These requests can be made either through the CLI or GUI interfaces
Shell
Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements
Kernel
The physical part of a computer including underlying electronics
Hardware
such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows.
GUI
A switch will forward traffic by default and does not need to be explicitly configured to operate.
Access Methods
This is a physical management port that provides out-of-band access to a Cisco device. Out-of-band access refers to access via a dedicated management channel that is used for device maintenance purposes only
Console
an in-band and recommended method for remotely establishing a secure CLI connection, through a virtual interface, over a network.
Secure Shell (SSH)
is an insecure, in-band method of remotely establishing a CLI session, through a virtual interface, over a network.
Telnet
you can use to connect to a networking device either by a serial connection over a console port, or by an SSH/Telnet connection
Terminal Emulation Programs
This mode has limited capabilities but is useful for basic operations. It allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device.
User EXEC Mode
To execute configuration commands, a network administrator must access
Privileged EXEC Mode
Mode allows access to only a limited number of basic monitoring commands.
It is often referred to as “view-only” mode.
User EXEC Mode
Mode allows access to all commands and features.
The user can use any monitoring commands and execute configuration and management commands.
Privileged EXEC Mode
Used to configure console, SSH, Telnet, or AUX access.
Line Configuration Mode
Used to configure a switch port or router network interface.
Interface Configuration Mode
To move in and out of global configuration mode, use the
Configure Terminal
As shown in the figure, the portion of the OS that interacts directly with computer hardware is known as the kernel. The portion that interfaces with applications and the user is known as the shell.
T
When using a CLI, the user interacts directly with the system in a text-based environment by entering commands on the keyboard at a command prompt,
T
A GUI such as Windows, macOS, Linux KDE, Apple iOS, or Android allows the user to interact with the system using an environment of graphical icons, menus, and windows.
T
GUIs may not always be able to provide all the features available with the CLI. GUIs can also fail, crash, or simply not operate as specified. For these reasons, network devices are typically accessed through a CLI. The CLI is less resource intensive and very stable when compared to a GUI.
T
When you are learning how to modify device configurations, you might want to start in a safe, non-production environment before trying it on real equipment.
T
Which IOS mode allows access to all commands and features?
Privileged EXEC mode
Which IOS mode are you in if the Switch(config)# prompt is displayed?
Global Configuration Mode
Which IOS mode are you in if the Switch> prompt is displayed?
User EXEC Mode
Which two commands would return you to the privileged EXEC prompt regardless of the configuration mode you are in? (Choose two.)
CTRL Z
END
This is a specific parameter defined in the operating system (in the figure, ip protocols).
Keyword
This is not predefined; it is a value or variable defined by the user (in the figure, 192.168.10.5).
Argument
text indicates commands and keywords that you enter literally as shown.
Boldface
text indicates arguments for which you supply values
Italics
indicate an optional element (keyword or argument)
Square Brackets`
indicate a required element (keyword or argument).
Braces
indicate a required choice within an optional element. Spaces are used to clearly delineate parts of the command.
Braces and vertical lines within square brackets
The command is ping and the user-defined argument is the ip-address of the destination device. For example, ping 10.10.10.5.
ping ip-address
The command is traceroute and the user-defined argument is the ip-address of the destination device. For example, traceroute 192.168.254.254.
Traceroute ip-address
When a command output produces more text than can be displayed in a terminal window, the IOS will display a “–More–” prompt.
T
The use of weak or easily guessed passwords continues to be the biggest security concern of organizations. Network devices, including home wireless routers, should always have passwords configured to limit administrative access.
T
All networking devices should limit administrative access by securing privileged EXEC, user EXEC, and remote Telnet access with passwords. In addition, all passwords should be encrypted and legal notifications provided.
T
What is the command to assign the name “Sw-Floor-2” to a switch?
hostname SW-floor 2
How is the privileged EXEC mode access secured on a switch?
enable secret class
Which command enables password authentication for user EXEC mode access on a switch?
login
Which command encrypts all plaintext passwords access on a switch?
service password encryption
Which is the command to configure a banner to be displayed when connecting to a switch?
banner motd $ Keep out $
This is the saved configuration file that is stored in NVRAM. It contains all the commands that will be used by the device upon startup or reboot. Flash does not lose its contents when the device is powered off.
startup-config
This is stored in Random Access Memory (RAM). It reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
running-config
The downside to using the reload command to remove an unsaved running config is the brief amount of time the device will be offline, causing network downtime.
T
What is the structure of an IPv4 address called?
dotted- decimal format
How is an IPv4 address represented?
four decimal number between 0 and 255 separated by period.
What type of interface has no physical port associated with it?
Switch Virtual Interface SVI
(DHCP).
Dynamic Host Configuration Protocol
Which statement is true about the running configuration file in a Cisco IOS device?
It affects the operation of the device immediately when modified
Which two statements are true regarding the user EXEC mode?
The device prompt for this mode ends with >
Only some aspects of the router configuration can be viewed
Which type of access is secured on a Cisco router or switch with the enable secret command?
privileged EXEC
What is the default SVI on a Cisco switch?
VLAN1
When a hostname is configured through the Cisco CLI, which three naming conventions are part of the guidelines?
Should begin with letter
no spaces
no more than 64 characters
What is the function of the shell in an OS?
Interfaces between the users and kernel
A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display
User EXEC Model
An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?
Nothing must be done
Which memory location on a Cisco router or switch will lose all content when the device is restarted?
RAM
Why would a technician enter the command copy startup-config running-config?
To copy an existing configuration into RAM
Which functionality is provided by DHCP?
Automatic assignment of an IP address to each host
Which two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI? (Choose two.)
Displaying a list of available commands within the current mode
determining which keyword, option, or argument is available for the entered command
Which memory location on a Cisco router or switch stores the startup configuration file?
NVRAM
To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used?
10.1.0.0
Whether connecting to a local printer in the home or a website in another country, before any network communications can occur, a___ ____ to a local network must be established
physical connection
NIC
Network Interface Cards
Not all physical connections are equal, in terms of the performance level, when connecting to a network.
T
The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
T
The destination node physical layer retrieves these individual signals from the media, restores them to their bit representations, and passes the bits up to the data link layer as a complete frame.
T
he physical layer is only concerned with wired network connections.
T
When a frame is encoded by the physical layer, all bits are sent over the media at the same time.
F
The physical layer of the receiving device passes bits up to which higher level layer?
Data Link
The physical layer of the receiving device passes bits up to which higher level layer?
Frame
The protocols and operations of the upper OSI layers are performed using software designed by software engineers and computer scientists.
T
The physical layer consists of electronic circuitry, media, and connectors developed by engineers.
T
it is appropriate that the standards governing this hardware are defined by the relevant electrical and communications engineering organizations.
T
ISO
International Organization for Standardization
TIA/EIA
Telecommunications Industry Association/Electronic Industries Association
ITU
International Telecommunication Union
ANSI
American National Standards Institute
IEEE
Institute of Electrical and Electronics Engineers
FCC
National telecommunications regulatory authorities including the Federal Communication Commission in the USA
(ETSI)
the European Telecommunications Standards Institute
The physical layer standards address three functional areas:
Physical Components
Encoding
Signaling
are the electronic hardware devices, media, and other connectors that transmit the signals that represent the bits.
Physical Components
is a method of converting a stream of data bits into a predefined “code”
Encoding or Line Encoding
The physical layer must generate the electrical, optical, or wireless signals that represent the “1” and “0” on the media.
Signaling
Different physical media support the transfer of bits at different rates. Data transfer is usually discussed in terms of
Bandwidth
Bandwidth is typically measured in
Kilobits per second (kbps), Megabit per second (Mbps) or gigabits per second (Gbps)
Terms used to measure the quality of bandwidth include:
Latency
Throughput
Goodput
refers to the amount of time, including delays, for data to travel from one given point to another.
Latency
is the measure of the transfer of bits across the media over a given period of time.
Throughput
There is a third measurement to assess the transfer of usable data; it is known as
Goodput
Which media uses patterns of microwaves to represent bits?
Wireless
Which media uses patterns of light to represent bits?
Fiber-optic
Which media uses electrical pulses to represent bits?
copper
Which of these is the name for the capacity of a medium to carry data?
bandwidth
Which of these is a measure of the transfer of bits across the media?
throughput
can distort and corrupt the data signals being carried by copper media. Potential sources of EMI and RFI include radio waves and electromagnetic devices, such as fluorescent lights or electric motors.
Electromagnetic interference (EMI) or radio frequency interference (RFI)
Is a disturbance caused by the electric or magnetic fields of a signal on one wire to the signal in an adjacent wire.
Crosstalk
cabling is the most common networking media.
Unshielded Twisted Pair (UTP Cable)
provides better noise protection than UTP cabling
Shielded Twisting Pairing (STP Cable)
gets its name from the fact that there are two conductors that share the same axis.
Coaxial Cable
A copper conductor is used to transmit the electronic signals.
T
A layer of flexible plastic insulation surrounds a copper conductor.
T
The insulating material is surrounded in a woven copper braid, or metallic foil, that acts as the second wire in the circuit and as a shield for the inner conductor. This second layer, or shield, also reduces the amount of outside electromagnetic interference.
T
The entire cable is covered with a cable jacket to prevent minor physical damage.
T
Coaxial cables attach antennas to wireless devices. The coaxial cable carries radio frequency (RF) energy between the antennas and the radio equipment.
Wireless Installations
Cable service providers provide internet connectivity to their customers by replacing portions of the coaxial cable and supporting amplification elements with fiber-optic cable. However, the wiring inside the customer’s premises is still coax cable.
Cable Internet Installations
Which of the following attaches antennas to wireless devices? It can also be bundled with fiber-optic cabling for two-way data transmission.
Coaxial Cable
Which of the following counters EMI and RFI by using shielding techniques and special connectors?
STP
Which of the following is the most common network media?
UTP
Which of the following terminates with BNC, N type and F type connectors?
Coaxial
When used as a networking medium, UTP cabling consists of four pairs of color-coded copper wires that have been twisted together and then encased in a flexible plastic sheath. Its small size can be advantageous during installation.
T
UTP cable does not use shielding to counter the effects of EMI and RFI. Instead, cable designers have discovered other ways that they can limit the negative effect of crosstalk:
T
Designers now pair wires in a circuit. When two wires in an electrical circuit are placed close together, their magnetic fields are the exact opposite of each other. Therefore, the two magnetic fields cancel each other and also cancel out any outside EMI and RFI signals.
Cancellation
To further enhance the cancellation effect of paired circuit wires, designers vary the number of twists of each wire pair in a cable. UTP cable must follow precise specifications governing how many twists or braids are permitted per meter (3.28 feet) of cable. Notice in the figure that the orange/orange white pair is twisted less than the blue/blue white pair. Each colored pair is twisted a different number of times.
Varying the number of twists per wire pair
UTP cable relies solely on the cancellation effect produced by the twisted wire pairs to limit signal degradation and effectively provide self-shielding for wire pairs within the network media.
T
The most common type of networking cable. It is commonly used to interconnect a host to a switch and a switch to a router.
Ethernet Straight-through
A cable used to interconnect similar devices. For example, to connect a switch to a switch, a host to a host, or a router to a router.
Ethernet Crossover
Using a crossover or straight-through cable incorrectly between devices may not damage the devices, but connectivity and communication between the devices will not take place.
T
Optical fiber cable transmits data over longer distances and at higher bandwidths than any other networking media.
T
Optical fiber is a flexible, but extremely thin, transparent strand of very pure glass, not much bigger than a human hair
T
(SMF)
Single Mode Fiber
MMF
Multimode fiber
Used for backbone cabling applications and interconnecting infrastructure devices
Enterprise Networks
Used to provide always-on broadband services to homes and small businesses
Fiber-to-the-Home (FTTH
Used by service providers to connect countries and cities
Long-Haul Networks
Used to provide reliable high-speed, high-capacity solutions capable of surviving in harsh undersea environments at up to transoceanic distances. Search the internet for “submarine cables telegeography map” to view various maps online.
Submarine Cable Networks
Which of the following fiber-optic cable types can help data travel approximately 500 meters?
Multimode
Which of the following fiber-optic cable types use light emitting diodes (LEDs) as a data light source transmitter?
Multimode
Which of the following fiber-optic cable types use lasers in a single stream as a data light source transmitter?
Single mode
Which of the following fiber-optic cable types is used to connect long-distance telephony and cable TV applications?
Single Mode
Which of the following fiber-optic cable types can travel approximately 100 km?
Single mode
Which of the following fiber-optic cable types is used within a campus network?
Multi mode
Wireless data communication technologies work well in open environments. However, certain construction materials used in buildings and structures, and the local terrain, will limit the effective coverage.
Coverage Area
Wireless is susceptible to interference and can be disrupted by such common devices as household cordless phones, some types of fluorescent lights, microwave ovens, and other wireless communications.
Interface
Wireless communication coverage requires no access to a physical strand of media. Therefore, devices and users, not authorized for access to the network, can gain access to the transmission. Network security is a major component of wireless network administration
Security
WLANs operate in half-duplex, which means only one device can send or receive at a time. The wireless medium is shared amongst all wireless users. Many users accessing the WLAN simultaneously results in reduced bandwidth for each user.
Shared medium
commonly referred to as Wi-Fi.
Wi-Fi (IEEE 802.11)
This is a wireless personal area network (WPAN) standard, commonly known as
Bluetooth
this wireless standard uses a point-to-multipoint topology to provide wireless broadband access.
WiMAX (IEEE 802:16)
specification used for low-data rate, low-power communications.
Zigbee (IEEE 802.15.4)
These concentrate the wireless signals from users and connect to the existing copper-based network infrastructure, such as Ethernet. Home and small business wireless routers integrate the functions of a router, switch, and access point into one device, as shown in the figure
Wireless Access Point (AP)
These provide wireless communication capability to network hosts.
Wireless NIC adapters
True or false. Wireless is not well suited for enterprise networks.
T
True or false. Wireless LANs operate in full-duplex allowing all devices to send or receive data at the same time so the number of users does not impact performance.
F
Which of the following wireless standards is best suited for industrial and IoT environments?
Zigbee
Which of the following wireless standards is used for Personal Area Networks (PANs) and allows devices to communicate over distances of 1 to 100 meters?
Bluetooth
The signals are patterns of electrical pulses.
Copper Cable
The signals are patterns of light.
Fiber optic Cable
The signals are patterns of microwave transmissions.
Wireless
A network administrator is troubleshooting connectivity issues on a server. Using a tester, the administrator notices that the signals generated by the server NIC are distorted and not usable. In which layer of the OSI model is the error categorized?
Physical Layer
What type of cable is used to connect a workstation serial port to a Cisco router console port?
rollover
Why are two strands of fiber used for a single fiber optic connection?
They allow for full duplex connectivity
Which procedure is used to reduce the effect of crosstalk in copper cables?
Twisting opposite circuit wire pairs together
What is one advantage of using fiber optic cabling rather than copper cabling?
Able to carry signals much farther than copper cabling
A network administrator is designing a new network infrastructure that includes both wired and wireless connectivity. Under which situation would a wireless connection be recommended?
End user device needs mobility when connecting to the network
Which type of UTP cable is used to connect a PC to a switch port?
Straight through
What is the definition of bandwidth?
Amount of data that can flow from one place to another in a given amount of time
Which statement correctly describes frame encoding?
It converts bits into a predefined code in order to provide a predictible pattern to help distinguish data bits from control bits
What is a characteristic of UTP cabling?
Cancellation
A wireless LAN is being deployed inside the new one room office that is occupied by the park ranger. The office is located at the highest part of the national park. After network testing is complete, the technicians report that the wireless LAN signal is occasionally affected by some type of interference. What is a possible cause of the signal distortion?
Microwave oven
What is the purpose of the OSI physical layer?
Transmitting bits across the local media
Which characteristic describes crosstalk?
The distortion of the transmitted of messages from signals carried in adjacent wires
What is indicated by the term throughput?
Measure of the bits transferred the media over a given period of time
Which standards organization oversees development of wireless LAN standards?
IEEE
IP address
Internet protocol address
The email server runs email server software. Clients use mail client software, such as Microsoft outlook, to access on the server.
Client and server software usually run on separate computers, but it is also possible for one computer to be used for both roles at the same time.
In small businesses and homes, many computers function as the servers and clients on the network. This type of network is called a peer-to-peer network.
Peer-to-Peer
USB
Universal Serial Bus
NIC
network interface card
The network devices that people are most familiar with are end devices. To distinguish one end device from another, each end device on a network has an address
End Devices
. They can connect multiple individual networks to form an internetwork
Intermediary Devices
Intermediary network devices perform some or all of these functions:
Regereate and retransmit communication signals
Maintain information about what pathways exist through the network and internetwork
Notify other devices of errors and communication failures
Direct data along alternative pathways when there is a link failure
Classify and direct messages according to priorities
Permit or deny the flow of data, based on security settings
Network Media
Communication transmits across a network on media. The media provides the channel over which the message travels from source to destination
Data is encoded into electrical impulses.
Metal wires within cables
Data is encoded into pulses of light.
Glass or plastic fibers within cables (fiber-optic cable)
Data is encoded via modulation of specific frequencies of electromagnetic waves.
Wireless transmission
Network architects and administrators must be able to show what their networks will look like.
Network Representation
A NIC physically connects the end device to the network.
Network Interface Card
A connector or outlet on a networking device where the media connects to an end device or another networking device.
Physical port
Specialized ports on a networking device that connect to individual networks. Because routers connect networks, the ports on a router are referred to as network interfaces.
Interface
are mandatory documentation for anyone working with a network. They provide a visual map of how the network is connected. There are two types of topology diagrams: physical and logical.
Topology diagrams
topology diagrams illustrate the physical location of intermediary devices and cable installation, as shown in the figure.
Physical topology diagrams
topology diagrams illustrate devices, ports, and the addressing scheme of the network, as shown in the figure.
Logical topology diagrams
networks allow people to work from home, or a remote office. Many self-employed workers use these types of networks to advertise and sell products, order supplies, and communicate with customers
Small office and home office
is the largest network in existence. In fact, the term internet means a “network of networks”. It is a collection of interconnected private and public networks.
The internet
LAN
Local area networks
WAN
Wide area networks
ISP
Internet service provider
Typically offered by cable television service providers, the internet data signal transmits on the same cable that delivers cable television. It provides a high bandwidth, high availability, and an always-on connection to the internet.
Cable
Digital Subscriber Lines also provide high bandwidth, high availability, and an always-on connection to the internet.
DSL
are people, or electronic devices, that need to send a message to other individuals or devices.
Message source (sender)
The destination receives the message and interprets it.
Message Destination (receiver)
This consists of the media that provides the pathway over which the message travels from source to destination.
Channel
Sending a message, whether by face-to-face communication or over a network, is governed by rules called protocols.
T
Before communicating with one another, individuals must use established rules or agreements to govern the conversation.
T
Network Protocol Requirements
Message encoding
Message formatting and encapsulation
Message size
Message timing
Message delivery options
This is the process of managing the rate of data transmission.
Flow Control
If a person asks a question and does not hear a response within an acceptable amount of time, the person assumes that no answer is coming and reacts accordingly.
Response Timeout
This determines when someone can send a message.
Access method
What is the process of converting information into the proper form for transmission?
Encoding
Which step of the communication process is concerned with properly identifying the address of the sender and receiver?
Formatting
Which three are components of message timing?
Flow Control
Access Method
Response Timeout
Which delivery method is used to transmit information to one or more end devices, but not all devices on the network?
Multicast
Network protocols define a common format and set of rules for exchanging messages between devices.
T
Protocols enable two or more devices to communicate over one or more networks.
The Ethernet family of technologies involves a variety of protocols such as IP, Transmission Control Protocol (TCP), HyperText Transfer Protocol (HTTP), and many more.
Network Communications Protocols
Protocols secure data to provide authentication, data integrity, and data encryption. Examples of secure protocols include Secure Shell (SSH), Secure Sockets Layer (SSL), and Transport Layer Security (TLS).
Network Security Protocols
rotocols enable routers to exchange route information, compare path information, and then to select the best path to the destination network. Examples of routing protocols include Open Shortest Path First (OSPF) and Border Gateway Protocol (BGP).
Routing Protocols
Protocols are used for the automatic detection of devices or services. Examples of service discovery protocols include Dynamic Host Configuration Protocol (DHCP) which discovers services for IP address allocation, and Domain Name System (DNS) which is used to perform name-to-IP address translation.
Service Discovery Protocols
This identifies the sender and the intended receiver of the message using a defined addressing scheme. Examples of protocols that provide addressing include Ethernet, IPv4, and IPv6.
Addressing
This function provides guaranteed delivery mechanisms in case messages are lost or corrupted in transit. TCP provides guaranteed delivery.
Reliability
This function ensures that data flows at an efficient rate between two communicating devices. TCP provides flow control services.
Flow control
This function uniquely labels each transmitted segment of data. The receiving device uses the sequencing information to reassemble the information correctly. This is useful if the data segments are lost, delayed or received out-of-order. TCP provides sequencing services.
Sequencing
This function is used to determine if data became corrupted during transmission. Various protocols that provide error detection include Ethernet, IPv4, IPv6, and TCP.
Error Detection
This function contains information used for process-to-process communications between network applications. For example, when accessing a web page, HTTP or HTTPS protocols are used to communicate between the client and server web processes.
Application Interface
A message sent over a computer network typically requires the use of several protocols, each one with its own functions and format.
Protocol Interaction
This protocol governs the way and web server and a web client interact
Hypertext Transfer Protocol (HTTP)
Is responsible for guaranteeing the reliable delivery of the information and managing flow control between the end devices
TCP
This protocol is responsible for delivering messages from the sender to the receiver
Is used by routers to forward the messages across mulptiple networks.
IP
Is responsible for the deliver of messages from one NIC to another NIC on the same Ethernet local area network LAN
Ethernet
BGP and OSPF are examples of which type of protocol?
Routing
Which two protocols are service discovery protocols?
DNS
DHCP
What is the purpose of the sequencing function in network communication?
To uniquely label transmitted segments of data for proper reassembly by the receiver
This protocol is responsible for guaranteeing the reliable delivery of information.
TCP
A protocol suite is a group of inter-related protocols necessary to perform a communication function.
T
Is a set of protocols that work together to provide comprehensive network communication services.
Protocol Suites
Is the most common and relevant protocol suite used today
Internet Protocol Suite/ TCP or IP
Is a family of protocols developed jointly in 1977 by the International Organization for Standardization (ISO)
Open System Interconnection (OSI)
A short-lived proprietary protoclol suite released by Apple Inc.
Apple Talk
A short-lived proprietary protocol suite released and network operating system developed by Novell Inc.
Novell Netware
TCP/IP protocols are available for the application, transport, and internet layers
T
This means it is freely available to the public and can be used by any vendor on their hardware or in their software
Open Standard Protocol Suite
This means it has been endorsed by the networking industry and approved by a standard organization
Standards based protocol suite
DNS
Domain Name System. Translates domain names such as cisco.com, into IP addresses.
Dynamic Host Configuration Protocol for IPv4.
DHCPv4
DHCPv6A DHCPv6 server dynamically assigns IPv6 addressing information to DHCPv6 clients at start-up.
DHCPv6
SLAAC
Stateless Address Autoconfiguration. A method that allows a device to obtain its IPv6 addressing information without using a DHCPv6 server.
Enables clients to send email to a mail server and enables servers to send email to other servers.
Simple Mail Transfer Protocol.
Enables clients to retrieve email from a mail server and download the email to the client’s local mail application.
POP3 - Post Office Protocol version 3
Enables clients to access email stored on a mail server as well as maintaining email on the server.
IMAP - Internet Message Access Protocol
Sets the rules that enable a user on one host to access and transfer files to and from another host over a network. FTP is a reliable, connection-oriented, and acknowledged file delivery protocol.
FTP - File Transfer Protocol.
As an extension to Secure Shell (SSH) protocol, SFTP can be used to establish a secure file transfer session in which the file transfer is encrypted. SSH is a method for secure remote login that is typically used for accessing the command line of a device.
SFTP - SSH File Transfer Protocol.
A simple, connectionless file transfer protocol with best-effort, unacknowledged file delivery. It uses less overhead than FTP.
TFTP - Trivial File Transfer Protocol.
A set of rules for exchanging text, graphic images, sound, video, and other multimedia files on the World Wide Web.
HTTP - Hypertext Transfer Protocol
A secure form of HTTP that encrypts the data that is exchanged over the World Wide Web.
HTTPS - HTTP Secure.
A web service that uses application programming interfaces (APIs) and HTTP requests to create web applications.
REST - Representational State Transfer.
UDP and TCP belong to which layer of the TCP/IP protocol?
Transport
Which two protocols belong in the TCP/IP model application layer?
DNS, DHCP
Which protocol operates at the network access layer of the TCP/IP model?
Ethernet
Which of the following are protocols that provide feedback from the destination host to the source host regarding errors in packet delivery? (Choose two.)
ECMPv4
ICMPv6
A device receives a data link frame with data and processes and removes the Ethernet information. What information would be the next to be processed by the receiving device?
IP at the internet layer
Which services are provided by the internet layer of the TCP/IP protocol suite? (Choose three.)
Routing Protocols
Messaging
Internet Protocol
Open standards encourage interoperability, competition, and innovation. They also guarantee that the product of no single company can monopolize the market or have an unfair advantage over its competition.
T
Various organizations have different responsibilities for promoting and creating standards for the internet and TCP/IP protocol.
T
Responsible for promoting the open development and evolution of internet use throughout the world.
Internet Society (ISOC)
Responsible for the overall management and development of internet standards.
Internet architecture Board (IAB)
Develops, updates, and maintains internet and TCP/IP technologies. This includes the process and documents for developing new protocols and updating existing protocols, which are known as Request for Comments (RFC) documents
Internet Engineering Task Force (IETF)
Focused on long term research related to internet TCP/IP protocols such as Anti-Spam Research Group (ASRG) Crypto Forum Research Group (CFRG) and Peer to Peer Research Group (P2PRG)
Internet Research Task Force (IRTF)
Based in the United States, ICANN coordinates IP address allocation the management of domains names, and assignment of other information us in TCP/IP protocols.
Internet Corporation for Assigned Names and numbers (CANN)
Responsible for overseeing and managing IP address allocation, domain name management and protocol identifiers for ICANN
Internet Assigned Numbers Authority (IANA)
Organization of electrical engineering and electronics dedicated to advancing technological innovation and creating standards in a wide area of industries including power and energy, healthcare, telecommunications, and networking. Important IEEE networking standards include 802.3 Ethernet and 802.11 WLAN standard. Search the internet for other IEEE network standards.
Institute of Electrical and Electronics Engineers
Organization is best known for its standards relating to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment.
Electronic Industries Alliance (EIA)
Organization responsible for developing communication standards in a variety of areas including radio equipment, cellular towers, Voice over IP (VoIP) devices, satellite communications, and more.
Telecommunications Industry Association (TIA)
One of the largest and oldest communication standards organizations. The ITU-T defines standards for video compression, Internet Protocol Television (IPTV), and broadband communications, such as a digital subscriber line (DSL).
International Telecommunications Union-Telecommunication Standardization Sector (ITU-T)
True or false. Standards organizations are usually vendor-neutral.
T
This standards organization is concerned with the Request for Comments (RFC) documents that specify new protocols and update existing ones.
Internet Engineering Task Force (IETF)
This standards organization is responsible for IP Address allocation and domain name management
Internet Assigned Numbers Authority (IANA)
What types of standards are developed by the Electronics Industries Alliance (EIA)
Electric Wiring and Connectors
layer contains protocols used for process-to-process communications.
application
layer provides for common representation of the data transferred between application layer services.
presentation
layer provides services to the presentation layer to organize its dialogue and to manage data exchange.
session
layer defines services to segment, transfer, and reassemble the data for individual communications between the end devices.
transport
layer provides services to exchange the individual pieces of data over the network between identified end devices.
network
layer protocols describe methods for exchanging data frames between devices over a common media
data link
protocols describe the mechanical, electrical, functional, and procedural means to activate, maintain, and de-activate physical connections for a bit transmission to and from a network device.
physical layer
Represents data to the user, plus encoding and dialog control.
Application
Supports communication between various devices across diverse networks.
Transport
Determines the best path through the network.
Internet
Controls the hardware devices and media that make up the network.
Network Access
Because a large data stream is segmented into packets, large amounts of data can be sent over the network without tying up a communications link. This allows many different conversations to be interleaved on the network called multiplexing.
Increases speed
-If a single segment is fails to reach its destination due to a failure in the network or network congestion, only that segment needs to be retransmitted instead of resending the entire data stream.
Increases efficiency
The general term for the PDU used at the application layer
Data
Transport layer PDU
Segment
Network Layer PDU
Packet
Data Link layer PDU
Frame
Physical layer PDU used when physically transmitting data over the medium
Bits
When messages are being sent on a network, the encapsulation process works from top to bottom.
T
De-encapsulation is the process used by a receiving device to remove one or more of the protocol headers.
T
What is the process of dividing a large data stream into smaller pieces prior to transmission?
Segmentation
What is the PDU associated with the transport layer?
Segment
Which protocol stack layer encapsulates data into frames?
Data Link
What is the name of the process of adding protocol information to data as it moves down the protocol stack?
Encapsulation
The network and data link layers are responsible for delivering the data from the source device to the destination device.
T
Responsible for delivering the IP packet from the original source to the final destination, which may be on the same network or a remote network.
Network layer source and destination addresses
Responsible for delivering the data link frame from one network interface card (NIC) to another NIC on the same network.
Data link layer source and destination addresses
True or false? Frames exchanged between devices in different IP networks must be forwarded to a default gateway.
T
True or false? The right-most part of an IP address is used to identify the network that a device belongs to.
F
What is used to determine the network portion of an IPv4 address?
Subnet Mask
Which of the following statements are true regarding network layer and data link layer addresses?
Network Layer addressess are logical and data link addresses are expressed as 12 hexadecimal digits
Data link layer addresses are physical and network layer addresses are logical
Network layer addresses are either 32 or 128 bits in lengths
What is the order of the two addresses in the data link frame?
Destination MAC, Source MAC
True or False? Data Link addresses are physical so they never change in the data link frame from source to destination.
F
Which three acronyms/initialisms represent standards organizations?
IEEE
IANA
In computer communication, what is the purpose of message encoding?
to convert information to the appropriate form for transmission
Which message delivery option is used when all devices need to receive the same message simultaneously?
broadcast
What are two benefits of using a layered network model? (Choose two.)
It assists in protocol design
It prevents technology in one layer from affecting other layers
What is the purpose of protocols in data communications?
Providing the rules required for a specific type of communication to occur
Which logical address is used for delivery of data to a remote network?
Destination IP address
What is the general term that is used to describe a piece of data at any layer of a networking model?
Protocol Data Unit
Which two protocols function at the internet layer? (Choose two.)
IP
ICMP
Which layer of the OSI model defines services to segment and reassemble data for individual communications between end devices?
Transport
Which type of communication will send a message to a group of host destinations simultaneously?
Multicast
What process is used to receive transmitted data and convert it into a readable message?
Decoding
What is done to an IP packet before it is transmitted over the physical medium?
It is encapsulated in a layer 2 frame
What process is used to place one message inside another message for transfer from the source to the destination?
Encapsulation
A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?
HTTP, TCP, IP, Ethernet