CISCO Exam 4 Flashcards

1
Q

Subnetting Information

A

fu = n + 1
br = n2 - 1
lu = br - 1

subnet: 1 2 4
host: 256 128 64
mask: 24 25 26

Question for Stokes: How many subnets for 2 hosts?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Broadcast Domain

A

Interface that Routers send broadcasts to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

anycast

A

multiple devices with same address. Sent to closest device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are GUAs?

A

ipv6 public addresses

Global Routing Prefix ~ provider assigned
Subnet/Interface ID ~ identifies subnet and host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Local Link Address

A

Communication on same link/subnet. FE80::

all ipv6 need LLA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unique Local Address

A

FC00 – FDFF

communication of nodes on different links/subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RS
RA

A

hosts ask router for addressing
router sends to host nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are Local Link Addresses Configured?

A
  1. EUI-64 ~ adds bits to mac address
  2. Random interface ID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are GUAs dynamically configured

A
  1. SLAAC ~ everything
  2. SLAAC Stateless ~ some from dhcp
  3. Stateful ~ everything from dhcp but default gateway
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to verify ipv6 address?

A

show ipv6 route
show ipv6 interface brief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ipv6 multicast address types

A

well known

solicited node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two common IPv6 assigned multicast groups?

A

FF02::1 – All nodes
FF02::2 – All routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Traceroute

A

Gives path that packet hopped on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DAD

A

Detects Duplicate Addresses

(Duplicate Address Detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transport Layer Protocols

A

TCP (Slow and Thorough)
-Large Header

UDP (Fast and Sloppy)
-Small Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port Numbers

A

Identify application in system

18
Q

Socket Pair

A

Pair of source and destination port/ip addresses.

19
Q

Port Group

A

1023
49151
65000

20
Q

Legacy Classful Addressing

A

127
191
223
239
254

21
Q

netstat

A

Lists protocols in use

22
Q

TCP Flow Controls

A

Window Size ~ Determines the number of bytes that can be sent before expecting an
acknowledgement

Segment Size

Congestion Control ~ Limits data sent if not receiving acknowledgment

23
Q

RST

A

Reset Connection

24
Q

Presentation Layer

A

Presents data properly

25
Application Layer
Communicates between application and network
26
Session Layer
Keeps information exchange active
27
P2P network
two devices share info without server
28
P2P application
two devices both each clients and servers
29
HTTP message types
Get ~ Client Request Data Post + Put ~ Upload Data to Server
30
SMTP
Sending Email Protocol
31
Internet Message Access Protocol
retrieves emails and does not delete after retrieval.
32
POP
retrieves emails and deletes after retrieval
33
DNS
Converts ip to recognizable names A ~ ipv4 address AAAA ~ ipv6 address NS ~ name server MX ~ mail record
34
Requesting ipv6 from DHCP Process
Discover Offer Request Pack ~ DHCP aknowledges user will use info DORP
35
Virus + Worm + Trojan Horse Difference
They are types of malware Virus = Evil File Spread Worm = Itself Spread Trojan Horse = User Spread
36
AAA
Controls who has access to network, record of all activity.
37
Firewalls
In between networks and filter traffic
38
End point security
Making sure employees don't leak
39
DMZ
Outsiders can access some of internal network
40
Access Attacks
Manipulate Device