Cisco Network Flashcards

1
Q

What does a Network interface card do

A

Physically connects the end device to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What connection physically connects the end device to the network

A

Network interface card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What connections are specialised ports on a network that connects to individuals networks

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of network lets you see which end devices are connected to intermediary devices and what media is being used

A

Logical. Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of network topology lets you see the actual location of intermediary devices and cable installations

A

Physical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is LAN

A

LAN is a small geographical area of network administered by a individual and provides bandwidth to internal end devices and intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a wan

A

Wan is a network infrastructure that covers wide geographical area managed by service providers it connects lan to other lan networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an intranet

A

An intranet is a private connection of Lans and wans that belong to an organisation it’s designed to only be accessed by the organisation’s members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a extranet

A

An networks for organisation to use for providing access to suppliers and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name 5 common connections for home and offices

A

-Cable
-DSL
-Cellular
-Satellite
-Dial-up Telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name 4 business internet connections

A

-Dedicated Leased Line
-Metro Ethernet
-Business DSL
-Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a fault tolerant network

A

To limit the number of affected devices during a failure it is built to allow quick recovery when a failure occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a fault tolerant network work

A

The network depends on multiple paths and allows traffic to be split in packets that are routed over a shared network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a scalability network

A

This expands quickly to support new users and applications it does this without degrading the performance of services that are being used by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is quality of service

A

Controls the flow of bandwidth (bits) and if network bandwidth is exceeded and network congestion happens devices will hold the packets in memory until resources become available to transmit them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the primary requirements of network security

A

-Confidentiality
-integrity
-availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Having multiple paths to a destination is known as redundancy this is an example of what network architecture

A

Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Switch1> config t
% Invalid input detected at ‘^’ marker.

(Refer to the exhibit^)
An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

A

The administrator must first enter privileged EXEC mode before issuing the command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the four cloud types

A

-public clouds

Made for general population
-private clouds

Set up by private organisations can be expansive
-Hybrid clouds

Made up of two or more clouds can be part private and part public
-Community clouds

Follows a set level of security and privacy and regulations open for organisations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 7 common security Threats

A

Viruses - contain malicious software or code running on a device

Spyware and adware- installed on device and secretly collects information about the user

Zero day attacks- Occur on the first day vulnerabilities become known

Threat actor attacks-A person attacks users devices or network resources

Denial of service attacks- Slows or crashes applications and processes on a network device

Data interception and theft-This attack captures private information from organisations network

Identity theft- steals the login credentials of a user to access private data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the 6 security solutions to protect network

A

Antivirus and antispyware- Help protect end devices becoming infected

Firewall Filtering- Blocks unauthorised access into and out of the network

Dedicated firewall systems- Provide more advanced firewall capabilities that can filter larger amounts of traffic

Access control lists-These further filter access and traffic forwarding based on IP addresses and applications

Intrusion prevention systems- Identify fast spreading threats such as zero day or zero hour attacks

Virtual private network (VPN)- Provide secure access into an organisation for remote workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the 6 security solutions to protect network

A

Antivirus and antispyware- Help protect end devices becoming infected

Firewall Filtering- Blocks unauthorised access into and out of the network

Dedicated firewall systems- Provide more advanced firewall capabilities that can filter larger amounts of traffic

Access control lists-These further filter access and traffic forwarding based on IP addresses and applications

Intrusion prevention systems- Identify fast spreading threats such as zero day or zero hour attacks

Virtual private network (VPN)- Provide secure access into an organisation for remote workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an ISP

A

It is an internet service provider that is any company that provides individuals and organisations access to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which term refers to a network that provided access to the corporate offices by suppliers customers etc.

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

In which scenario would the use of wisp be recommended

A

In areas with low density WiFi or cable access is not available

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which device performs the function of determining the path that messages should take through the internetworks

A

A router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What does the shell and kernel part of the operating system do

A

Shell- The user interface that allows users to request specific tasks from computers

Kernel- Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured

A

Console Port since the switch does not have any initial configurations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch

A

Console

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through telephone connection

A

Aux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which access method would be the most appropriate in-band access to the IOS over a network connection

A

Telnet/SSH

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Definition of console port

A

This is a physical management port that provides out of band access to Cisco devices. The advantage of using a console port is that the device is accessible even if no networking services are configured

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Definition for Secure Shell (SSH)

A

This is an in-band and recommend method for remotely establishing a secure CLI connection, through a virtual interface over a network. Unlike console connection SSH connection requires active networking services on the device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Definition for Telnet

A

Telnet is an insecure in-band method of remotely establishing a CLI session through a virtual interface over a network unlike SSH telnet does not provide a secure encrypted connection and should only be used in an lab environment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Is Aux used through telephone connection true or false?

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the User EXEC mode in command modes

A

This mode is useful for basic operations it allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

How is the user EXEC mode identified on CLI

A

CLI prompt will end with the > symbol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What is the privileged EXEC Mode

A

This executes configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes like global configuration mode can only be reached from privileged EXEC mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

How can the Privileged EXEC mode be identified on the CLI command

A

Symbol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which IOS mode allows access to all commands and feature

A

Privileged Exec Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Which IOS mode are you in if Switch> prompt is displayed

A

User EXEC Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What Two command prompts would return you to the privileged EXEC prompt regardless of the configuration mode you are in

A

CTRL+Z

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

Which IOS mode are you in if the Switch(config)# prompt is displayed

A

Global Configuration mode

44
Q

What type of interface has no physical port associated with it

A

Switch Virtual Interface (SVI)

45
Q

What is the structure of an IPv4

A

Dotted-decimal format

46
Q

How are IPV4 addresses written

A

They are written as four groups of decimal numbers separated by periods for example 192.168.1.1

47
Q

Which type of access is secured on Cisco router or switch with the enable secret command

A

Privileged EXEC

48
Q

What is the default SVI on a Cisco switch

49
Q

When a hostname is configured through the Cisco CLI which three naming conventions are part of the guidelines

A

-The host name show be fewer than 64 characters in length

-The hostname should contain no spaces

-The hostname should begin with a letter

50
Q

What is the function of the Shell in OS

A

It Interfaces between the users and the kernel

51
Q

A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display

A

USER EXEC MODE

52
Q

An Administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device

A

Copy the running configuration to the startup configuration file

53
Q

Which memory location on a CISCO router will lose all content when the device is restarted

54
Q

Why would a technician enter the command, Copy startup-config running-config

A

To save an active configuration to NVRAM

55
Q

What Functionality is provided by DHCP

A

Automatic assignment of an IP address to each host

56
Q

Which memory location on a CISCO router or switch stores the startup configuration file

57
Q

To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used

58
Q

What network protocols are required to successfully deliver a message

A

Message encoding
Message formatting and encapsulation
Message size
Message timing
Message delivery option

59
Q

Message timing is a requirement of network protocols what are the 3 parts of message timing and explain them

A

Flow control -Defines how much information can be sent and the speed of which it can be delivered

Response Timeout-This specifys how long to wait for a response and what action to take if response timesout

Access Method- This determines when a user can send a message

60
Q

Which delivery method is used to transmit information to one or more end devices but not all devices on the network

A

Multi cast

61
Q

Which step of the communication process is concerned with properly identifying the address of the sender and receiver

A

Formatting

62
Q

What is the process of converting information into the proper form for transmission

63
Q

What is the network security protocols

A

This secures data to provide authentication such as data encryption. Examples of secure protocols are Secure Shell (SSH) Secure Sockets Layer (SSL) and Transport Layer Security (TLS)

64
Q

Definition routing protocols

A

Protocols enable routers to exchange route information and compares path information this selects the best path to the destination network examples of this are Open Shortest Path First (OSPF) And Border Gateway Protocol (BGP)

65
Q

What is Service Discovery Protocols

A

This is used for the detection of devices or services examples of this are Dynamic Host Configuration Protocol (DHCP) this discovers services for IP address and also Domain Name System (DNS) which is used to perform name-to-IP address translation

66
Q

What is the Network communications Protocols

A

This enables device’s to communicate over one or more networks the examples of this are (TCP) and (HTTP)

67
Q

BGP and OSPF are examples of which type of Network protocol

68
Q

What is the purpose of the sequencing function in the network communication

A

To uniquely label transmitted segments of data for proper reassembly by the receiver

69
Q

Which two network protocols are service discovery protocols

70
Q

What Network protocol is reasonable for guaranteeing the reliable delivery of information

71
Q

At which OSI layer is a source IP address added to a PDU during the encapsulation process

A

Network Layer

72
Q

At which OSI layer is a source IP address added to a PDU during the encapsulation process

A

Network Layer

73
Q

Why would a layer 2 switch need and IP address

A

To enable the switch to be managed remotely

74
Q

What process involves placing one PDU inside another PDU

A

Encapsulation

75
Q

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent to quickly

A

Flow control

76
Q

Which name is assigned to the transport layer PDU

77
Q

Which three application layer protocols are part of the TCP/IP protocol suite

A

DHCP. DNS. FTP

78
Q

What is the advantage of networking devices using open standard protocols

A

A client host and a server running different operating systems can successfully exchange data

79
Q

Which method allows a computer to react accordingly when it requests data from a server and the server takes to long to respond

A

Response timeout

80
Q

What LAYER is responsible for routing messages through an internetwork in the TCP/IP model

81
Q

At which layer of the OSI model would a logical address be added during encapsulation

A

Network layer

82
Q

What function does pressing the Tab key have when entering a command in IOS

A

It completes the remainder of a partially typed word in a command

83
Q

Which Interface allows remote management of a layer 2 switch

A

The switch virtual interface

84
Q

What are two characteristics of RAM on a Cisco device

A

1.The configuration that is actively running on the device is stored in RAM

2.The contents of RAM are lost during a power cycle

85
Q

What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address

A

Show IP interface brief

86
Q

Give a description of ISO

A

ISO are the largest developer of international standards in the word for a wide variety of products and services it is known for its open system Interconnection (OSI)

87
Q

Description of ISOC

A

This organisation promotes the open development and the use of the internet throughout the world

88
Q

Which organisation is responsible for overseeing and managing IP address allocation domain name management, and protocol identifiers

89
Q

True or false.

The physical layer is only concerned with wired network connections

90
Q

True or False.

When a frame is encoded by the physical layer, all bits are sent over the media at the same time

91
Q

The physical layer of the receiving device passed bits up to which higher level layer

92
Q

What PDU is received by the physical layer for encoding and transmission

93
Q

What is latency

A

This refers to the amount of time, including delays for data to travel from one point to another

94
Q

What is throughput

A

Throughput is the measure of the transfer of bits across the media over a given period of time

95
Q

What is Goodput

A

Goodput is the measurement of useable data transferred over a given period of time

96
Q

Which media uses patterns of microwaves to represent bits

97
Q

Which media uses patterns of light to represent bits

A

Fiver-Optic

98
Q

Which media uses electrical pulses to represent bits

99
Q

What is the name for the capacity of a medium to carry data

100
Q

What is the name for the measure of bits across the media

A

Throughput

101
Q

What is a MAC address

A

This is a unique identifier assigned to a network interface controller, used for communications within a network segment

102
Q

What does MAC address stand for

A

Media Access control Address

103
Q

What does MAC address stand for

A

Media Access control Address

104
Q

How is the MAC address represented

A

12-digit hexadecimal number

105
Q

What do the first 6 digits of a MAC identify

A

The manufacturer of the device