DPT 3 Flashcards

1
Q

Kam nepieciešama maršrutēšanas tabula

A

Lai rūteris varētu zināt kur sūtīt datus kas nav ar viņa tīkla adressi.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Sniegt maršrutēšanas tabulas ieraksta paraugu?

A

ip route prefix mask ip-address [metric-value]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Kādu informāciju satur maršrutēšanas tabulas ieraksts?

A

pieejamo tīklu ip adresses un subnet mask nākamo ip tīkla adresi un garumu.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Kādu informāciju satur maršrutēšanas tabula?

A

ip route prefix mask ip-address [metric-value]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Uz kuras iekārtas atrodas maršrutēšanas tabula?

A

rūteris

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Kā var aplūkot maršrutēšanas tabulu?

A

show ip route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Sniegt maršrutētāja tīkla interfeisu piemērus?

A

rj45

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Kādus rezultātus sniedz “show ip route” komanda?

A

parāda maršrutēšanas tabulu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Kādas IP adreses jāpiešķir maršrutētāja tīkla kartēm?

A

atšķirīgas, citu tīklu

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Kas ir statiskais maršruts?

A

lietotāja istādīts maršruts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Ar kādu komandu var nokonfigurēt statisko maršrutu?

A

ip route prefix mask ip-address [metric-value]

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Kas ir noklusētais maršruts “default route” un kādās situācijās to izmanto?

A

Adefaultroutehas an IPv4route entry of 0.0.0.0/0
route any packets to a network that a router does not directly know about to a next-hop router

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Sniegt noklusētā maršruta “default route” konfigurācijas piemēru!

A

ip route 0.0.0.0. 0.0.0.0 (next-hop ip) admin-distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Kādās situācijās izvēlās statisko maršrutēšanu?

A

mazos tīklos ja nav dinamiska un iekšējos tīklus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Kādi ir statiskās maršrutēšanas mīnusi?

A

automātiski neatjaunināsies ja manīsies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Kas ir dinamiskā maršrutēšana?

A

automātiska maršrutēšanas tabulas izveidošana

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Kādi ir dinamiskās maršrutēšanas plusi?

A

tabulu veido automātiski

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Kādi ir dinamiskās maršrutēšanas mīnusi?

A

It is also less secure than static routing because the interfaces identified by the routing protocol send routing updates out.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Kādas ir dinamisko maršrutēšanas protokolu pamatfunkcijas?

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Nosaukt četrus dinamiskās maršrutēšanas protokolus!

A

RIP EIGRP IGRP OSPF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q
  • Kādi konfigurācijas ieraksti jāveic, lai uz pasniedzēja norādītā maršrutētāja darbotos dinamiskā maršrutēšana?
A

ip routing;

router rip

network x.x.x.x

=—-conected only

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Kā noskaidrot dinamisko maršrutēšanas protokolu izveidotos maršrutēšanas ierakstus?

A

show ip route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Kas ir RIP?

A

Rip ir maršrutēšanas protokols. Pārsvarā tas tiek lietots nelielos iekšējos tīklos Routing Information Protocol (RIP).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Kas ir EIGRP?

A

Enhanced Interior Gateway Routing Protocol (EIGRP) - dinamiskās maršrutēšanas protokols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Kas ir IGRP?

A

Interior Gateway Routing Protocol(IGRP) is a distance vector interior gateway protocol (IGP) developed by Cisco

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Kas ir OSPF?

A

Open Shortest Path First (OSPF) - dinamiskās maršrutēšanas protokols.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Kas ir IGP un EGP? Kādās situācijās izmanto?

A

interior gateway protocol (IGP) exterior gateway protocol (EGP).

Interior Gateway Protocolis used to forward the packets among different networks that use the same autonomous system number. Whereas theexterior Gateway Protocol
have the capability of forwarding data packets to different networks with different autonomous system numbers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Kas ir maršrutēšanas protokolu metrika? Sniegt piemērus.

A

distance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Kāds ir slodzes dalīšanas “load balancing” mērķis?

A

split use equaly

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Kad var izmantot slodzes dalīšanu “load balancing”?

A

When arouter has two or more paths to a destination with equal cost metrics, then therouter forwards the packets using both paths equally. This is called equal cost load balancing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Ko nozīmē tieši pieslēgtais “directly connected” tīkls?

A

fiziski pievienots

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Kāpēc sūtot IP paketes procesā tiek izmantotas arī MAC adreses?

A

MAC Addresses handle the physical connection from computer to computer while IP Addresses handle the logical routeable connection from both computer to computer AND network to network

However, MAC Addresses are physical and are NOT routeable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Kas ir ARP un kam tas nepieciešams?

A

adress resolution protucol broadcasts a request packet to all the machines on the LAN and asks if any of the machines are using that particular IP address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Distances vektora “distance vector” dinamiskie maršrutēšanas protokolu piemēri un to pamatīpašības?

A

knows delay

35
Q

Link-state dinamiskie maršrutēšanas protokolu piemēri un to pamatīpašības?

A

The OSPF protocol is a link-state routing protocol, which means thatthe routers exchange topology information with their nearest neighbors

ink state protocols are also calledshortest-path-first protocols
. Link state routing protocols have a complete picture of the network topology. Hence they know more about the whole network than any distance vector protocol. Three separate tables are created on each link state routing enabled router

36
Q

Kāda ir “classless” un “classful” maršrutēšanas atšķirība?

A

Classful Routing does not import subnet mask. And in this also subnet mask is provided after the route update. In classful routing, subnet mask is same throughout, does not vary for all devices, we can see it in the given picture. In classful routing,VLSM (Variable Length Subnet Mask)
is not supported and alsoCIDR (Classless Inter-Domain Routing)
.

Classless Routing imports subnet mask and in this, triggered updates are used. In classless routing, VLSM (Variable Length Subnet Mask) is supported and also CIDR (Classless Inter-Domain Routing). In classless routing, hello messages are used for checking status. In classless routing, subnet mask is not same throughout, it may vary for all devices, we can see it in the given picture

37
Q

Kam maršrutēšanas tabulas ierakstā domāta “administartive distance” vērtība?

A

to distinct distances for multiple routes

38
Q

Kas ir maršrutēšanas protokolu konverģences laiks, kas to veido?

A

Convergence time isa measure of how fast a group of routers reach the state of convergence
. It is one of the main design goals and an important performance indicator for routing protocols, which should implement a mechanism that allows all routers running the protocol to quickly and reliably converge.

39
Q

Raksturo periodiskos un trigerētos maršrutēšanas protokolu ziņojums!

A

periodic and triggered

40
Q

Kas ir maršrutēšanas cilpas, kā tās rodas?

A

A routing loop is an issue that occurs when the routers forward packets such that the same single packet ends up back at the same router repeatedly in the network because of the unusual behavior of the routing table when the data packets keep getting routed again and again between two or more routers.

41
Q

Raksturot galvenos paņēmienus maršrutēšanas cilpu novēršanai!

A

A split horizon
is a technique to avoid routing loops by disabling the router from sending information about a failed route in the routing table through the same interface that it learned about the route from.

42
Q

Kas ir VLSM un CIDR? Kam to izmanto?

A

VLSM (Variable Length Subnet Mask) is supported and also CIDR (Classless Inter-Domain Routing).

43
Q

Kas ir “wildcard” maska? Kur to izmanto?

A

reverse subnet 0.0.0.256

44
Q

Raksturo simetrisko un asimetrisko komutāciju!

A

Asymmetric Network: An asymmetric network has multiple routes for incoming and outgoing network traffic. As such traffic takes a different route when entering or exiting the network.

Symmetric Network: A symmetric network has a single route for incoming and outgoing network traffic. As such traffic takes the same route when entering or the network.

45
Q

Kādu papildu funkcionalitāti nodrošina Layer3 komutators salīdzinot ar Layer2 komutatoru

A

routing

46
Q

Kādas ir hierarhiska tīkla priekšrocības un hierarhiskā modeļa līmeņi?

A
47
Q

Kādas būtiskas funkcijas nodrošina mūsdienu komutatori bez klasiskās kadru komutācijas

A

routing

packet cheking

48
Q

Kas ir VLAN, kam to izmanto?

A

virtuālais lokālais tīkls lai virtuāli sadalītu tīklu atseviški

49
Q

Sniegt VLAN izmantošanas piemēru!

A

split local network

50
Q

Kā noskaidrot vai komutators atbalsta VLAN funkcionalitāti?

A

show vlan

51
Q

Kas ir “trunk” tīklos kuros izmanto VLAN tehnoloģiju?

A

A VLAN trunk isan OSI Layer 2 link between two switches that carries traffic for all VLANs
(unless the allowed VLAN list is restricted manually or dynamically)

52
Q

Pēc kāda principa notiek VLAN definēšana?

A

vlan 2;

53
Q

Kam izmanto inter-VLAN maršrutēšanu?

A

lai pārsūtītu no viena vlan uz otru

54
Q

Kas ir STP, kam tas nepieciešams?

A

TheSpanning Tree Protocol
(STP) is a network protocol that builds a loop-free logical topology for Ethernet networks.

55
Q

Kā noskaidrot vai komutators spēj apstrādāt Layer2 cilpas?

A
56
Q

Kāpēc būtu nepieciešams uz maršrutētāja izmantot “sub-interfaces” kādai no Ethernet tīkla kartēm?

A

One of the uses of subinterfaces is to provide unique Layer 3 interfaces to each VLAN that is supported by the parent interface. In this scenario, the parent interface connects to a Layer 2 trunking port on another device. You can configure a subinterface and associate the subinterface to a VLAN ID using 802.1Q trunking.

57
Q

Kas ir NAT? Kam to izmanto?

A

network address translations lai tolkotu privāto un publisko adressi

58
Q

Uzskaitīt NAT izmantošanas variantus!

A
  • Access the internet from a private subnet.
  • Access your network using allow-listed IP addresses.
  • Enable communication between overlapping networks.
59
Q

Kādi ir NAT izmantošanas galvenie iguvumi?

A

var atdalīt tīklus un izmantot vairākas reizes noteitku ip

60
Q

Kas ir RIR un to funkcija?

A

There are five Regional Internet Registries (RIRs) in the world. RIRs manage, distribute, and register Internet number resources (IPv4 and IPv6 address space and Autonomous System (AS) Numbers) within their respective regions.

61
Q

Kas ir un kam izmanto “port-forwarding”?

A

Suppose a person is outside home for some work and wants to access his home desktop and server, then he will make requests using different port numbers to his router

62
Q

Kas ir ACL, kam to izmanto?

A

An access control list (ACL)contains rules that grant or deny access to certain digital environments
.

63
Q

Raksturot standarta ACL!

A

An access control list (ACL)contains rules that grant or deny access to certain digital environments

64
Q

Raksturot paplašināto “extended” ACL!

A

xtended Access Control Lists (ACLs)act as the gatekeeper of your network
. They either permit or deny traffic based on protocol, port number, source, destination, and time range. The range of customization is massive

65
Q

Kas ir ugunsmūris, kādi principi nodrošina tā pamatfunkcionalitāti?

A

In computing, a firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules. A firewall typically establishes a barrier between a trusted network and an untrusted network, such as

66
Q

Kāda vadlīnija jāņem vērā tīklā izvietojot standarta ACL?

A
67
Q

Kāda vadlīnija jāņem vērā tīklā izvietojot paplašināto “extended” ACL?

A
68
Q

Kādā secībā rakstīt ACL konfigurācijas ierakstus?

A

ip access-group 1 outbound

(config) #ip access-list standard NAME

(config-std-nacl) #permit 10.1.5.1

(config-std-nacl) #deny 192.168.1.53

(config-std-nacl) #permit 172.30.0.0 0.0.255.255

69
Q

Kas ir MikroTik

A

uzņēmums

70
Q

Kas ir RouterOS

A

mikrotik OS

71
Q

Kas ir winbox, kā un kādiem nolūkiem to izmanto?

A

Winbox isa small utility that allows administration of MikroTik RouterOS using a fast and simple GUI

72
Q

Kas ir webfig, kā un kādiem nolūkiem to izmanto?

A

WebFig
is a web-based RouterOS utility that allows you to monitor,

73
Q

Kā pieslēgties MikroTik maršrutētājam?

A

ssh webfig winbox

74
Q

Ugunsmūra konfigurēšanas principi MikroTik maršrutētājos.

A

create reusabvle date

75
Q

NAT konfigurēšanas principi MikroTik maršrutētājos.

A
76
Q

Kas ir SFP un kādiem nolūkiem to izmanto?

A

Small form-factor pluggable
, or SFP, devices are hot-swappable interfaces used primarily in network and storage switches. The SFP ports on a switch and SFP modules enable the switch to connect to fiber and Ethernet cables of different types and speeds.

77
Q

Kas ir VPN?

A

virtual private network

78
Q

Nosaukt vismaz četrus VPN tunelēšanas veidus?

A

internet protocol security IPSec
Layer 2 tunneling protocol L2TP
Point-to-point Tunneling protocol PPTP
SSL and TLS Secure Socket Layer Transport layer Security
OpenVPN
Secure Shell SSH

79
Q

Kas ir SSL, kam to izmanto?

A

The Secure Sockets Layer (SSL) protocol was developed by Netscape Communications Corporation. SSL ensures the data that is transferred between a client and a server remains private. This protocol enables the client to authenticate the identity of the server.

80
Q

Kas ir IPSec, kam to izmanto?

A

a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).

81
Q

Kas ir PPTP, kam to izmanto?

A

Point to Point Tunneling Protocol (PPTP) is one of the oldest protocols still being used by VPNs today. Developed by Microsoft and released with Windows 95, PPTP encrypts your data in packets and sends them through a tunnel it creates over your network connection.

PPTP is one of the easiest protocols to configure, requiring only a username, password, and server address to connect to the server. It’s one of the fastest VPN protocols because of its low encryption level.

While it boasts fast connection speeds, the low level of encryption makes PPTP one of the least secure protocols you can use to protect your data. With known vulnerabilities dating as far back as 1998, and the absence of strong encryption, you’ll want to avoid using this protocol if you need solid online security and anonymity – government agencies and authorities like the NSA have been able to compromise the protocol’s encryption.

82
Q

Kas ir L2TP, kam to izmanto?

A

Layer 2 Tunneling Protocol (L2TP) is used in conjunction with Internet Protocol Security (IPSec) to create a more secure tunneling protocol than PPTP. L2TP encapsulates the data, but isn’t adequately encrypted until IPSec wraps the data again with its own encryption to create two layers of encryption, securing the confidentiality of the data packets going through the tunnel.

L2TP/IPSec provides AES-256 bit encryption, one of the most advanced encryption standards that can be implemented. This double encapsulation does, however, make it a little slower than PPTP. It can also struggle with bypassing restrictive firewalls because it uses fixed ports, making VPN connections with L2TP easier to block. L2TP/IPSec is nonetheless a very popular protocol given the high level of security it provides.

83
Q

Kas ir IKEv2, kam to izmanto?

A

Internet Key Exchange version 2 (IKEv2) is an IPsec based tunneling protocol that provides a secure VPN communication channel between peer VPN devices and defines negotiation and authentication for IPsec security associations (SAs) in a protected manner.