Cisco Network Flashcards
What does a Network interface card do
Physically connects the end device to the network
What connection physically connects the end device to the network
Network interface card
What connections are specialised ports on a network that connects to individuals networks
Interface
What type of network lets you see which end devices are connected to intermediary devices and what media is being used
Logical. Topology
What type of network topology lets you see the actual location of intermediary devices and cable installations
Physical topology
What is LAN
LAN is a small geographical area of network administered by a individual and provides bandwidth to internal end devices and intermediary devices
What is a wan
Wan is a network infrastructure that covers wide geographical area managed by service providers it connects lan to other lan networks
What is an intranet
An intranet is a private connection of Lans and wans that belong to an organisation it’s designed to only be accessed by the organisation’s members
What is a extranet
An networks for organisation to use for providing access to suppliers and customers
Name 5 common connections for home and offices
-Cable
-DSL
-Cellular
-Satellite
-Dial-up Telephone
Name 4 business internet connections
-Dedicated Leased Line
-Metro Ethernet
-Business DSL
-Satellite
What is the purpose of a fault tolerant network
To limit the number of affected devices during a failure it is built to allow quick recovery when a failure occurs
How does a fault tolerant network work
The network depends on multiple paths and allows traffic to be split in packets that are routed over a shared network
What is a scalability network
This expands quickly to support new users and applications it does this without degrading the performance of services that are being used by users
What is quality of service
Controls the flow of bandwidth (bits) and if network bandwidth is exceeded and network congestion happens devices will hold the packets in memory until resources become available to transmit them
What are the primary requirements of network security
-Confidentiality
-integrity
-availability
Having multiple paths to a destination is known as redundancy this is an example of what network architecture
Fault tolerance
Switch1> config t
% Invalid input detected at ‘^’ marker.
(Refer to the exhibit^)
An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?
The administrator must first enter privileged EXEC mode before issuing the command
What are the four cloud types
-public clouds
Made for general population
-private clouds
Set up by private organisations can be expansive
-Hybrid clouds
Made up of two or more clouds can be part private and part public
-Community clouds
Follows a set level of security and privacy and regulations open for organisations
What are the 7 common security Threats
Viruses - contain malicious software or code running on a device
Spyware and adware- installed on device and secretly collects information about the user
Zero day attacks- Occur on the first day vulnerabilities become known
Threat actor attacks-A person attacks users devices or network resources
Denial of service attacks- Slows or crashes applications and processes on a network device
Data interception and theft-This attack captures private information from organisations network
Identity theft- steals the login credentials of a user to access private data
What are the 6 security solutions to protect network
Antivirus and antispyware- Help protect end devices becoming infected
Firewall Filtering- Blocks unauthorised access into and out of the network
Dedicated firewall systems- Provide more advanced firewall capabilities that can filter larger amounts of traffic
Access control lists-These further filter access and traffic forwarding based on IP addresses and applications
Intrusion prevention systems- Identify fast spreading threats such as zero day or zero hour attacks
Virtual private network (VPN)- Provide secure access into an organisation for remote workers
What are the 6 security solutions to protect network
Antivirus and antispyware- Help protect end devices becoming infected
Firewall Filtering- Blocks unauthorised access into and out of the network
Dedicated firewall systems- Provide more advanced firewall capabilities that can filter larger amounts of traffic
Access control lists-These further filter access and traffic forwarding based on IP addresses and applications
Intrusion prevention systems- Identify fast spreading threats such as zero day or zero hour attacks
Virtual private network (VPN)- Provide secure access into an organisation for remote workers
What is an ISP
It is an internet service provider that is any company that provides individuals and organisations access to the internet
Which term refers to a network that provided access to the corporate offices by suppliers customers etc.
Extranet
In which scenario would the use of wisp be recommended
In areas with low density WiFi or cable access is not available
Which device performs the function of determining the path that messages should take through the internetworks
A router
What does the shell and kernel part of the operating system do
Shell- The user interface that allows users to request specific tasks from computers
Kernel- Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured
Console Port since the switch does not have any initial configurations
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch
Console
Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through telephone connection
Aux
Which access method would be the most appropriate in-band access to the IOS over a network connection
Telnet/SSH
Definition of console port
This is a physical management port that provides out of band access to Cisco devices. The advantage of using a console port is that the device is accessible even if no networking services are configured
Definition for Secure Shell (SSH)
This is an in-band and recommend method for remotely establishing a secure CLI connection, through a virtual interface over a network. Unlike console connection SSH connection requires active networking services on the device.
Definition for Telnet
Telnet is an insecure in-band method of remotely establishing a CLI session through a virtual interface over a network unlike SSH telnet does not provide a secure encrypted connection and should only be used in an lab environment
Is Aux used through telephone connection true or false?
True
What is the User EXEC mode in command modes
This mode is useful for basic operations it allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device
How is the user EXEC mode identified on CLI
CLI prompt will end with the > symbol
What is the privileged EXEC Mode
This executes configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes like global configuration mode can only be reached from privileged EXEC mode
How can the Privileged EXEC mode be identified on the CLI command
Symbol
Which IOS mode allows access to all commands and feature
Privileged Exec Mode
Which IOS mode are you in if Switch> prompt is displayed
User EXEC Mode
What Two command prompts would return you to the privileged EXEC prompt regardless of the configuration mode you are in
CTRL+Z
Which IOS mode are you in if the Switch(config)# prompt is displayed
Global Configuration mode
What type of interface has no physical port associated with it
Switch Virtual Interface (SVI)
What is the structure of an IPv4
Dotted-decimal format
How are IPV4 addresses written
They are written as four groups of decimal numbers separated by periods for example 192.168.1.1
Which type of access is secured on Cisco router or switch with the enable secret command
Privileged EXEC
What is the default SVI on a Cisco switch
VLAN99
When a hostname is configured through the Cisco CLI which three naming conventions are part of the guidelines
-The host name show be fewer than 64 characters in length
-The hostname should contain no spaces
-The hostname should begin with a letter
What is the function of the Shell in OS
It Interfaces between the users and the kernel
A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display
USER EXEC MODE
An Administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device
Copy the running configuration to the startup configuration file
Which memory location on a CISCO router will lose all content when the device is restarted
RAM
Why would a technician enter the command, Copy startup-config running-config
To save an active configuration to NVRAM
What Functionality is provided by DHCP
Automatic assignment of an IP address to each host
Which memory location on a CISCO router or switch stores the startup configuration file
NVRAM
To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used
10.1.0.0
What network protocols are required to successfully deliver a message
Message encoding
Message formatting and encapsulation
Message size
Message timing
Message delivery option
Message timing is a requirement of network protocols what are the 3 parts of message timing and explain them
Flow control -Defines how much information can be sent and the speed of which it can be delivered
Response Timeout-This specifys how long to wait for a response and what action to take if response timesout
Access Method- This determines when a user can send a message
Which delivery method is used to transmit information to one or more end devices but not all devices on the network
Multi cast
Which step of the communication process is concerned with properly identifying the address of the sender and receiver
Formatting
What is the process of converting information into the proper form for transmission
Encoding
What is the network security protocols
This secures data to provide authentication such as data encryption. Examples of secure protocols are Secure Shell (SSH) Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
Definition routing protocols
Protocols enable routers to exchange route information and compares path information this selects the best path to the destination network examples of this are Open Shortest Path First (OSPF) And Border Gateway Protocol (BGP)
What is Service Discovery Protocols
This is used for the detection of devices or services examples of this are Dynamic Host Configuration Protocol (DHCP) this discovers services for IP address and also Domain Name System (DNS) which is used to perform name-to-IP address translation
What is the Network communications Protocols
This enables device’s to communicate over one or more networks the examples of this are (TCP) and (HTTP)
BGP and OSPF are examples of which type of Network protocol
Routing
What is the purpose of the sequencing function in the network communication
To uniquely label transmitted segments of data for proper reassembly by the receiver
Which two network protocols are service discovery protocols
DNS DHCP
What Network protocol is reasonable for guaranteeing the reliable delivery of information
TCP
At which OSI layer is a source IP address added to a PDU during the encapsulation process
Network Layer
At which OSI layer is a source IP address added to a PDU during the encapsulation process
Network Layer
Why would a layer 2 switch need and IP address
To enable the switch to be managed remotely
What process involves placing one PDU inside another PDU
Encapsulation
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent to quickly
Flow control
Which name is assigned to the transport layer PDU
Segment
Which three application layer protocols are part of the TCP/IP protocol suite
DHCP. DNS. FTP
What is the advantage of networking devices using open standard protocols
A client host and a server running different operating systems can successfully exchange data
Which method allows a computer to react accordingly when it requests data from a server and the server takes to long to respond
Response timeout
What LAYER is responsible for routing messages through an internetwork in the TCP/IP model
Internet
At which layer of the OSI model would a logical address be added during encapsulation
Network layer
What function does pressing the Tab key have when entering a command in IOS
It completes the remainder of a partially typed word in a command
Which Interface allows remote management of a layer 2 switch
The switch virtual interface
What are two characteristics of RAM on a Cisco device
1.The configuration that is actively running on the device is stored in RAM
2.The contents of RAM are lost during a power cycle
What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address
Show IP interface brief
Give a description of ISO
ISO are the largest developer of international standards in the word for a wide variety of products and services it is known for its open system Interconnection (OSI)
Description of ISOC
This organisation promotes the open development and the use of the internet throughout the world
Which organisation is responsible for overseeing and managing IP address allocation domain name management, and protocol identifiers
IANA
True or false.
The physical layer is only concerned with wired network connections
False
True or False.
When a frame is encoded by the physical layer, all bits are sent over the media at the same time
False
The physical layer of the receiving device passed bits up to which higher level layer
Data link
What PDU is received by the physical layer for encoding and transmission
Frame
What is latency
This refers to the amount of time, including delays for data to travel from one point to another
What is throughput
Throughput is the measure of the transfer of bits across the media over a given period of time
What is Goodput
Goodput is the measurement of useable data transferred over a given period of time
Which media uses patterns of microwaves to represent bits
Wireless
Which media uses patterns of light to represent bits
Fiver-Optic
Which media uses electrical pulses to represent bits
Copper
What is the name for the capacity of a medium to carry data
Bandwidth
What is the name for the measure of bits across the media
Throughput
What is a MAC address
This is a unique identifier assigned to a network interface controller, used for communications within a network segment
What does MAC address stand for
Media Access control Address
What does MAC address stand for
Media Access control Address
How is the MAC address represented
12-digit hexadecimal number
What do the first 6 digits of a MAC identify
The manufacturer of the device