Day 1 - Networks, Cables, OSI, and TCP Models Flashcards

1
Q

What does

All People Seem To Need Data Processing

stand for?

A
Application
Presentation
Session
Transport
Network
Data Link
Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Application layer #?

A

7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Presentation layer #?

A

6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Session layer #?

A

5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Transport layer #?

A

4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network layer #?

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data Link layer #?

A

2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Physical layer #?

A

1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is the OSI model mnemonic?

A

All People Seem To Need Data Processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What is the process of data moving down the OSI model called?

A

Encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the process of data moving up the OSI model called?

A

De-encapsulation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Define the Application Layer (7)

A

This layer is the closest layer to the end-user. The Application Layer usually provides services such as e-mail (SNMP and POP3), web browsing (using HTTP), and file transfer services (using FTP). The Application Layer determines resource availability.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Define the Presentation Layer (6)

A

The Presentation Layer presents data to the Application Layer. Multimedia works here, so think mp4, jpeg, gif, etc. Encryption, decryption, and data compression also take place at this layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Define the Session Layer (5)

A

The role of the Session Layer is to set up, manage, and terminate sessions or dialogues between devices. These take place over logical links, and what is really happening is the joining of two software applications. SQL, RPC, and NFS all work at the Session Layer.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Define the Transport Layer (4)

A

The role of the Transport Layer is to break down the data from the higher layers into smaller parts, which are referred to as segments (at this layer). Virtual circuits are set up here, which are required before devices can communicate.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the three methods used to control data flow?

A

▪ Flow control
▪ Windowing
▪ Acknowledgements

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is Flow Control?

A

If the receiving system is being sent more information than it can process, it will ask the sending system to stop for a short time. This normally happens when one side uses broadband and the other uses a dial-up modem. The packet sent telling the other device to stop is known as a source quench message.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is Windowing?

A

With windowing, each system agrees upon how much data is to be sent before an acknowledgment is required. This “window” opens and closes as data moves along in order to maintain a constant flow.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are Acknowledgements?

A

When a certain amount of segments is received, the fact that they all arrived safely and in the correct order needs to be communicated to the sending system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the Three-Way Handshake?

A

This is where you send a packet to establish the session. This first packet is called a synchronise (SYN) packet. Then the remote device responds with a synchronise acknowledgement (SYN-ACK) packet. The session is established in the third phase when an acknowledgement (ACK) packet is sent.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which service does the Three-Way Handshake use?

A

TCP service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the two most widely known Transport Layer protocols?

A

Transmission Control Protocol (TCP)

User Datagram Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the main characteristics of TCP

A

Reliable connection-oriented protocol
Uses three-way handshake
Uses windowing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What protocols use TCP?

A

Telnet
HTTPS
FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the main characteristics of UDP?

A

Connectionless protocol
Smaller packets
Conserves time and network resources

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is an example of a protocol that uses UDP?

A

TFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Define the Network Layer (3)

A

The Network Layer takes the segments from the Transport Layer and breaks them down into smaller units called packets. The Network Layer must determine the best path to take from one network to another; for this reason, routers work at this layer. Routers use logical addressing here, and TCP/ IP addressing is called IP addressing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Define the Data Link Layer (2)

A

The Data Link Layer chops down packets into smaller units referred to as frames. Layer 2 switches work at this layer and use hardware or MAC addresses, so they can switch traffic much faster because there is no need to check IP addresses and routing tables. WAN protocols work at Layer 2, including HDLC, ISDN, and PPP. Ethernet also works at Layer 2. In order to interface with the upper and lower levels, the Data Link Layer is further subdivided into the Logical Link Control (LLC) Sublayer and the Media Access Control (MAC) Sublayer. The LLC Sublayer interfaces with the Network Layer and the MAC

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Define the Physical Layer (1)

A

At this layer, frames are converted into bits for placing on the wire. These bits consist of electrical pulses, which are read as “on” and “off” bits, or in binary 1s and 0s, respectively. Hubs work at this layer, and here is where you will find cable specifications, such as RJ45.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What is the four layer TCP/IP DoD Model?

A

Application (4)
Transport/Host-to-Host (3)
Internet or Internetwork (2)
Link/Network Interface (1)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What is the five layer TCP/IP DoD Model?

A
Application (5)
Transport (4)
Network (3)
Data Link (2)
Physical (1)
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What is the encapsulation and data called at the Application Layer?

A

Data, but not encapsulated yet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What is the encapsulation and data called at the Transport Layer?

A

TCP header added to the data.

Data is called a Segment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What is the encapsulation and data called at the Network Layer?

A

IP header added (including IP address).

Data is called a Packet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What is the encapsulation and data called at the Data Link Layer?

A

Data Link header added (Data Link address).

Data is called a Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What is the encapsulation and data called at the Physical Layer?

A

Data is turned into electrical signals.

Data is called Bits on the wire

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What is TCP/IP?

A

TCP/ IP is a complete suite of protocols and services which enable communication to take place over networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What layer does TCP operate at in the OSI model?

A

Transport Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What is the TCP port for FTP Data?

A

20

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What is the TCP port for FTP Control?

A

21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What is the TCP port for SSH?

A

22

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What is the TCP port for Telnet?

A

23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is the TCP port for SMTP?

A

25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What is the TCP port for DNS?

A

53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the TCP port for HTTP?

A

80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What is the TCP port for POP3?

A

110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What is the TCP port for NNTP?

A

119

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What is the TCP port for NTP?

A

123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the TCP port for TLS/SSL?

A

443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

At what OSI layer does Internet Protocol (IP) operate?

A

Network Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Define Internet Protocol (IP)

A

IP operates at the Network Layer of the OSI model. It is connectionless and is responsible for transporting data over the network. IP addressing is a function of Internet Protocol. IP examines the Network Layer address of every packet and determines the best path for that packet to take to reach its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Define User Datagram Protocol (UDP)

A

UDP transports information between network devices but, unlike TCP, no connection is established first. UDP is connectionless, gives best-effort delivery, and gives no guarantee that the data will reach its destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

At what OSI level does User Datagram Protocol (UDP) operate?

A

UDP operates at the Transport Layer of the OSI model.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Both TCP and UDP are carried over what protocol?

A

IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

When is UDP preferred over TCP?

A

For applications in which low latency is preferred over reliability or guarantees.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

What are three common UDP protocols and their related port numbers?

A

DNS 53
TFTP 69
SNMP 161/162

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

At what OSI layer does FTP operate at?

A

Application Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

What protocol does FTP use for data transfer?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the command to debug FTP traffic?

A

debug ip ftp

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

What protocol does SMTP use?

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

What is the command to debug HTTP traffic?

A

debug ip http

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

What is the only utility that can check all seven layers of the OSI model?

A

Telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

What is the command to quit an inactive telnet session?

A

Ctrl Shift 6 then X

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

What is the debug command for Telnet?

A

debug telnet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What does ICMP stand for?

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

What is ICMP used for?

A

ICMP is a protocol used to report problems or issues with IP packets (or datagrams) on a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

What happens when a problem is experienced with an IP packet?

A

The IP packet is destroyed and an ICMP message is generated and sent to the host that originated the packet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

ICMP delivers messages inside ?

A

IP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

What type of packet does a ping command generate?

A

An echo request packet

70
Q

What does TTL stand for?

A

Time to Live

71
Q

What are the keyboard commands to terminate a ping session?

A

Ctrl Shift 6 then X

72
Q

What type of packets does Traceroute use?

A

UDP

73
Q

What are the two types of addressing used to identify network hosts and their layers?

A

IP addressing (Network/Layer 3)

MAC address (Data Link/Layer 2)

74
Q

Explain address resolution

A

The process in which the IOS determines the Data Link Layer address (MAC address) from the Network Layer address (IP address)

75
Q

Define ARP

A

Address Resolution Protocol resolves a known IP address to a MAC address.

76
Q

If a host does not have the destination host’s MAC address in its ARP cache what does it do?

A

Sends out an ARP Broadcast message

77
Q

Define Proxy ARP

A

Proxy ARP enables hosts on an Ethernet network to communicate with hosts on other subnets or networks, even though they have no knowledge of routing.

78
Q

Do routers forward ARP Broadcasts by default?

A

No

79
Q

What is the proxy ARP command?

A

ip proxy-arp

80
Q

What is RARP?

A

Reverse Address Resolution Protocol

Maps a known MAC address to an IP address

81
Q

What is GARP?

A

Gratuitous Address Resolution Protocol

A gratuitous ARP request is a special ARP request packet where the source MAC, the source IP, and the destination IP addresses are all set to the IP address of the machine issuing the packet, and the destination MAC is the Broadcast address FFFF: FFFF: FFFF.

82
Q

When does a normal host send out a GARP request?

A

After the link goes up or the interface is enabled

83
Q

If you see a GARP reply what does that mean?

A

Another computer on the network has the same IP address as you do

84
Q

What is SNMP?

A

Simple Network Management Protocol

85
Q

What are the SNMP messages that network devices send to management stations called?

A

Traps

86
Q

What does HTTPS stand for and what are the two protocols used?

A

Hyper Text Transfer Protocol Secure

TLS and the older protocol SSL

87
Q

10Mbps is known by what name?

A

Ethernet

88
Q

100Mbps is known by what name?

A

FastEthernet

89
Q

1000Mbps is known by what name?

A

GigabitEthernet

90
Q

10Gbps is known by what name?

A

TenGigabitEthernet

91
Q

What does half duplex mean?

A

Data can only pass in one direction on the wire at a time

92
Q

What does full duplex mean?

A

Data can pass in both directions on the wire at the same time.

93
Q

What is the command to check an interface’s duplex settings?

A

show interface X

94
Q

If each pin on one end of an RJ45 cable matches the other side then this is known as a ?

A

straight-through cable

95
Q

What type of RJ45 cable would you need to connect an end device to an Ethernet port on a switch?

A

straight-through cable

96
Q

What type of RJ45 cable would you need to connect a switch to a router?

A

straight-through cable

97
Q

What type of RJ45 cable would you need to connect a pc to a pc?

A

crossover cable

98
Q

What type of RJ45 cable would you need to connect a switch to a switch?

A

crossover cable

99
Q

How does a crossover cable differ from a straight-through cable?

A

Two of the wires on the cable have been swapped.

1 to 3
2 to 6

4,5,7,8 stay the same

100
Q

“Flat” cables and “rollover” cables are examples of ?

A

console cables

101
Q

What are the typical characteristics of a console cable?

A

All pins/wires are swapped so 1 to 8, 2 to 7, etc.

They usually have an RJ45 connection on one end and a 9-pin D-Shaped connection on the other end.

102
Q

What does DTE stand for?

A

data terminal equipment

103
Q

What does DCE stand for?

A

data communications equipment

104
Q

A DB60 is an example of what type of cable?

A

Wide Area Network (WAN)

105
Q

Which end of a DB60 cable plugs into the customer equipment?

A

DTE

106
Q

Which end of a DB60 cable plugs into the ISP connection?

A

DCE

107
Q

What is the most important thing to remember about DCE and DTE cables?

A

You need to apply a clock rate to the DCE end in order for the line to come up.

108
Q

What is the command to establish which router has the DCE cable attached?

A

show controllers

109
Q

What is the command to see which interfaces you have on your router?

A

show ip interface brief

110
Q

What is the first mode you will be presented with when the router boots?

A

User mode

111
Q

User mode is also known as?

A

User Exec mode

112
Q

What is the command to take you from User mode to Privileged mode?

A

enable

113
Q

Privileged mode is also known as?

A

Privileged Exec mode

114
Q

What mode do you need to be in to configure the router?

A

Global Configuration mode

115
Q

What is the command to enter Global Configuration mode?

A

configure terminal

116
Q

What mode do you need to be in to enter Global Configuration mode?

A

Privileged Exec mode

117
Q

What are the two main types of commands you can use in Privileged Exec mode?

A

show and debug

118
Q

To make changes to the console, Telnet or auxiliary ports you need to be in what mode and what is the command?

A

Line Configuration mode

config t
line [type] X

119
Q

To configure a routing protocol on a router what mode do you need to be in and what is the command?

A

Router Configuration mode

config t
router rip

120
Q

How do you enter VLAN Configuration mode?

A

config t

vlan X

121
Q

What key combination will exit the current configuration mode?

A

Ctrl Z

122
Q

Keystrokes for moving to the beginning of the command line?

A

Ctrl A

123
Q

Keystrokes for moving to the end of the command line?

A

Ctrl E

124
Q

Keystrokes for moving back one character?

A

Ctrl F

125
Q

Keystrokes for moving back one word?

A

Esc B

126
Q

Keystrokes for moving forward one word?

A

Esc F

127
Q

Keystrokes for recalling the previous command?

A

Ctrl P or up arrow

128
Q

Keystrokes for recalling the next command?

A

Ctrl N or down arrow

129
Q

Keystrokes to delete a line?

A

Ctrl U

130
Q

Keystrokes to delete a word?

A

Ctrl W

131
Q

Keystroke to finish a command?

A

Tab

132
Q

Command to show last 10 (by default) commands entered?

A

show history

133
Q

Keystrokes to delete a single character?

A

Backspace

134
Q

Interfaces locations on routers are identified by ?

A

Module
Slot
Port

135
Q

What are the most common router and switch interfaces used in modern enterprise networks?

A

100Mbps–FastEthernet
1Gbps–GigabitEthernet
10Gbps–TenGigabitEthernet

136
Q

What are the three parameters that must be configured on a router interface for basic functionality?

A

Speed
Duplex
IP address

137
Q

What is the command to enter Interface Configuration mode?

A

config t

interface [interface name]

138
Q

What is the first step and related command in the interface configuration process?

A

enable the interface

no shutdown

139
Q

To configure the IP address on an interface what is the command?

A

config t
interface [interface name]
ip address [ip address] [subnet mask]

140
Q

What is the command to add a description/label to an interface?

A

description [description]

141
Q

What is the command to show the configuration in DRAM?

A

show running-configuration

142
Q

What is the command to show the configuration in NVRAM?

A

show startup-configuration

143
Q

What is the command to show which IOS is in flash?

A

show flash:

144
Q

What command shows a summary of all interfaces?

A

show ip interface brief

145
Q

What command shows statistics for a specific interface?

A

show interface [interface name]

146
Q

What are the five variables for the method parameter on an interface?

A
unset
manual
NVRAM
IPCP
DHCP
147
Q

What is the command to increase the history buffer?

A

terminal history size [size]

148
Q

What information does the Show Version command provide? (8)

A
type of router
IOS version
Memory capacity
Memory usage
CPU type
Flash capacity
Other hardware parameters
Reason for last reload
149
Q

What is the command to list all the networks the router can reach and information about the way they can be reached?

A

show ip route

150
Q

The show ip route command includes what specific information? (4)

A

Network
Routing protocol
Next Hop
Outgoing interface

151
Q

Name each layer of the OSI model, from Layer 7 down to Layer 1.

A

Application, Presentation, Session, Transport, Network, Data Link, and Physical.

152
Q

The role of the Session Layer is to _______, _______, and _______ sessions or dialogues between devices.

A

Set up, manage, and terminate.

153
Q

What are the three methods used to control data flow at Layer 4?

A

Flow control, windowing, and acknowledgements.

154
Q

The Transport Layer includes several protocols, and the most widely known are _______ and _______.

A

TCP and UDP.

155
Q

Why is UDP used at all if TCP/ IP offers guaranteed delivery?\

A

TCP uses a lot of bandwidth on the network and there is a lot of traffic sent back and forth to set up the connection, even before the data is sent. This all takes up valuable time and network resources. UDP packets are a lot smaller than TCP packets and they are very useful if a really reliable connection is not that necessary. Protocols that use UDP include DNS and TFTP.

156
Q

What is data referred to at each OSI layer?

A

Bits (Layer 1), Frames (Layer 2), Packets (Layer 3), Segments (Layer 4) and Data (Layers 5-7).

157
Q

In order to interface with the upper and lower levels, the Data Link Layer is further subdivided into which two Sublayers?

A

LLC and MAC.

158
Q

What are the five TCP/ IP layers from the top down?

A

Application, Transport, Network, Data Link, and Network.

159
Q

How does the TCP/ IP model map to the OSI model?

A

Write out.

160
Q

Layer 2 addresses are also referred to as _______ addresses.

A

MAC

161
Q

Using a switch will allow you to divide your network into smaller, more manageable sections known as _______ _______.

A

Collision domains.

162
Q

The current standard Ethernet cable still uses eight wires twisted into pairs to prevent _______ _______ and _______.

A

Electromagnetic interference (EMI) and crosstalk.

163
Q

_______ is when a signal from one Ethernet wire spills over into a neighbouring cable.

A

Crosstalk.

164
Q

Which command would set the FastEthernet router interface speed to 10Mbps?

A

The speed 10 command.

165
Q

On a crossover cable, the wire on pin 1 on one end needs to connect to pin _______ on the other end and pin 2 needs to connect to pin _______.

A

3 and 6.

166
Q

Which cable would you use to connect a router Ethernet interface to a PC?

A

A crossover cable.

167
Q

You can see a summary of which interfaces you have on your router with the show _______ _______ _______ command.

A

ip interface brief

168
Q

Line Configuration mode lets you configure which ports?

A

The console, Telnet and auxiliary ports.

169
Q

A Loopback interface is a _______ or _______ interface that you configure.

A

Virtual or logical

170
Q

The keyboard shortcut Ctrl + A does what?

A

moves the cursor to the beginning of the command line

171
Q

The _______ keyboard shortcut moves the cursor back one word.

A

Esc B

172
Q

By default, the _______ _______ command shows the last 10 commands entered.

A

show history