Exam One Study Guide (Ch. 1 - 3) Flashcards
What are the four basic elements of a network?
switches, routers, wireless access points, and the network itself
What are three elements of communication?
sender, receiver, and message
What is a LAN or WAN? How are they different? Characteristics?
An LAN is a network infrastructures that provides access to users and end devices in a small geographic area. A WAN is a network infrastructure that provides access to other networks over a wide geographic area.
Internet vs. Extranet vs. Intranet
The internet is a global network that connects millions of devices and computers worldwide. The intranet is a private network that is only accessible to authorized users within an organization. The extranet is a private network that allows external parties to access certain parts of an organization’s intranet.
What are the different types of home and small office internet connections/what are their purpose?
Cable: high bandwidth, always on, internet offered by cable television service providers.
DSL: high bandwidth, always on, internet connection that runs over a telephone line.
Cellular: uses a cell phone network to connect to the internet.
Satellite: major benefit to rural areas without Internet Service Providers.
Dial-up Telephone: an inexpensive, low bandwidth option using a modem.
What is a converged network?
carries multiple services on one network including data, voice, and video
What are the types of business internet connections?
Dedicated leased line: These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking.
Ethernet WAN: This extends LAN access technology into the WAN.
DSL: Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL).
Satellite: This can provide a connection when a wired solution is not available.
What are the four basic characteristics network admins must address at all times to meet user expectations and what does each represent?
Fault tolerance, Scalability, Quality of Service (QoS), and Security
The three primary requirements of network security and what they mean
Confidentiality: protecting sensitive information from unauthorized access, ensuring only those with proper credentials can view it.
Integrity: guaranteeing that data is not tampered with during transmission or storage, and that any changes are made by authoroized users only,
Availability: Ensuring that critical systems and data are accessible to authorized users whenever needed, without interuption.
Recent trends in networking and home technology
Bring your own device (BYOD)
Online Collaboration
Video Communications
Cloud Computing
What are the types of ‘clouds’ (four)
Public Clouds: available to the general publci through a pay-per-use model for a fee
Private Clouds: intended for a specific organization or entity such as the government
Hybrid Clouds: made up of two or more Cloud types - for example, part custom and part public. Each part remains a distinctive object but both are connected using the same architecture.
Custom Clouds: built to meet the needs of a specfic industry, such as healthcare or media. Can be private or public.
What are the different types of security threats and what solutions are available for security professionals?
Viruses, worms, and Trojan horses: These contain malicious software or code running on a user device.
Spyware and adware: These types of software are installed on a user’s device to secretly collect information about the user.
Zero-day attacks: Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
Threat actor attacks: In these attacks, malicious persons attack user devices or network resources.
Denial-of-Service attacks: These attacks slow or crash applciations and processes on a network device.
Data Interception and theft: This type of attack involves capturing private information from an organization’s network.
Identity theft: This type of attack involves stealing the login credentials of a user in order to access private data.
Solutions: antivirus and antispyware, firewall filtering, dedicated firewall systems, access control lists (ACL), intrusion prevention systems (IPS), Virtual Private Network (VPN)
What are the three components of an operation system and what do they do?
Shell: The user interface that allows users to request specific tasks from the computer. These requests can be made through either the CLI or GUI.
Kernel: the kernel communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Hardware: the physical part of a computer, including underlying electronics.
What is a GUI?
Graphic User Interface: allows the user to interact with the system using an environement of graphical icons, menus, and windows
Why do most users rely on a GUI environment?
More user-friendly and requires less knowledge of the underlying command structure that controls the system.
What is the purpose of a CLI?
Allows the users to interact with a network device directly by typing text commands to configure settings and manage security features on a cisco device
Name at least one advantage and disadvantage of a CLI interface?
This type of interface needs much less memory (RAM) in order to use compared to other types of user interfaces. However, commands have to be typed precisely. If there is a spelling error the command will fail.
When would you have to use the console port rather than Telnet?
when you need to access a device directly, even if the device isn’t connected to its primary network.
Why is SSH not used instead of telnet all the time?
SSH protects user identities, passwords, and data from network snooping attacks, and allows secure logins and file transfers.
What are the main Cisco iOS modes (describe…i.e. privileged exec, etc…), and which do you enter first when you access the CLI?
User EXEC: log in (Router>)
Priviledged EXEC: use the enable exec command (Router#)
Global Configuration: use the configure terminal command (Router(config)#)
Interface Configuration: use the interface command (Router (config-if)#)
What are the three methods of accessing the Cisco IOS command line interface?
Console: access the CLI by connecting directly to the console port.
Telnet: access the CLI remotely using a telnet session.
SSH: access the CLI remotely during a SSH session.
You know that there is a show (help) command that will show you the contents of the routing table, but you cannot remember which show command it is. What should you do?
“show IP route” or “show running-config”
What do network operating systems enable users to do through a GUI?
interact with the system using an environment of graphical icons, menus, and windows.
Which access method needs a physical connection in order to access network components?
Ethernet: ethernet is a networking standard that uses physical cables like twisted pair to connect devices on a network, meaning a direct wired connection is necessary to access network componenets using this method.
What programs are used to connect to network devices and allow for enhancing productivity or changing fonts?
Terminal emulation programs such as PuTTY, Tera Term, and SecureCRT
What are three popular terminal emulation programs?
PuTTY, Tera Term, and SecureCRT
What are the two primary command modes for management access in network components?
User Exec Mode & Priviledged Exec Mode
How do you know which iOS mode you are working in (symbols, (config), etc…)?
Router(config)#: Global configuration mode
Router(config-if)#: Interface configuration mode
Router#: Privileged EXEC mode
Router>: User EXEC mode
What is the prompt in privileged exec mode if the router’s name is Athens? (prompts are what you see before the command…look at the diagram in the text/slides about command lines syntax)
Athens#
What command would you enter in order to go to global configuration mode?
configure terminal
What is the prompt in global configuration mode if the router’s name is Athens?
Athens(config)#
What command exits the current configuration mode and returns to the pervious configuration mode?
the exit command
What command exits the current configuration mode and returns to EXEC mode?
the end command
What are the two most common sub-configuration modes and for what purpose are they used?
Interface sub-configuration mode & VLAN sub-configuration mode
What components make up the command structure syntax?
Prompt Command Space Keyword or Argument
(ex. switch>ping 192.168.10.5)
Why should each router and switch have a unique descriptive hostname?
A unique hostname makes it easier to identify and manage each router and switch within a network.
What are the important guidelines for naming routers and switches?
-start with a letter
-contain no spaces
-end with a letter or digit
-use only letters, digits, and dashes
-be less than 64 characters in length
What characterizes and determines strong passwords?
-more than eight digits in length
-upper and lower case
-variety
-avoid common words
Describe a IPv4 subnet mask.
a 32-bit number created by setting host bits to all 0s and setting network bits to all 1s.
How would I check to determine if a password is encrypted in IOS?
check the digit before the encrypted string in the configuration file