Exam One Study Guide (Ch. 1 - 3) Flashcards

1
Q

What are the four basic elements of a network?

A

switches, routers, wireless access points, and the network itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three elements of communication?

A

sender, receiver, and message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a LAN or WAN? How are they different? Characteristics?

A

An LAN is a network infrastructures that provides access to users and end devices in a small geographic area. A WAN is a network infrastructure that provides access to other networks over a wide geographic area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet vs. Extranet vs. Intranet

A

The internet is a global network that connects millions of devices and computers worldwide. The intranet is a private network that is only accessible to authorized users within an organization. The extranet is a private network that allows external parties to access certain parts of an organization’s intranet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the different types of home and small office internet connections/what are their purpose?

A

Cable: high bandwidth, always on, internet offered by cable television service providers.
DSL: high bandwidth, always on, internet connection that runs over a telephone line.
Cellular: uses a cell phone network to connect to the internet.
Satellite: major benefit to rural areas without Internet Service Providers.
Dial-up Telephone: an inexpensive, low bandwidth option using a modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a converged network?

A

carries multiple services on one network including data, voice, and video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the types of business internet connections?

A

Dedicated leased line: These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking.
Ethernet WAN: This extends LAN access technology into the WAN.
DSL: Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL).
Satellite: This can provide a connection when a wired solution is not available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four basic characteristics network admins must address at all times to meet user expectations and what does each represent?

A

Fault tolerance, Scalability, Quality of Service (QoS), and Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The three primary requirements of network security and what they mean

A

Confidentiality: protecting sensitive information from unauthorized access, ensuring only those with proper credentials can view it.
Integrity: guaranteeing that data is not tampered with during transmission or storage, and that any changes are made by authoroized users only,
Availability: Ensuring that critical systems and data are accessible to authorized users whenever needed, without interuption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Recent trends in networking and home technology

A

Bring your own device (BYOD)
Online Collaboration
Video Communications
Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the types of ‘clouds’ (four)

A

Public Clouds: available to the general publci through a pay-per-use model for a fee
Private Clouds: intended for a specific organization or entity such as the government
Hybrid Clouds: made up of two or more Cloud types - for example, part custom and part public. Each part remains a distinctive object but both are connected using the same architecture.
Custom Clouds: built to meet the needs of a specfic industry, such as healthcare or media. Can be private or public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the different types of security threats and what solutions are available for security professionals?

A

Viruses, worms, and Trojan horses: These contain malicious software or code running on a user device.
Spyware and adware: These types of software are installed on a user’s device to secretly collect information about the user.
Zero-day attacks: Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
Threat actor attacks: In these attacks, malicious persons attack user devices or network resources.
Denial-of-Service attacks: These attacks slow or crash applciations and processes on a network device.
Data Interception and theft: This type of attack involves capturing private information from an organization’s network.
Identity theft: This type of attack involves stealing the login credentials of a user in order to access private data.
Solutions: antivirus and antispyware, firewall filtering, dedicated firewall systems, access control lists (ACL), intrusion prevention systems (IPS), Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three components of an operation system and what do they do?

A

Shell: The user interface that allows users to request specific tasks from the computer. These requests can be made through either the CLI or GUI.
Kernel: the kernel communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Hardware: the physical part of a computer, including underlying electronics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a GUI?

A

Graphic User Interface: allows the user to interact with the system using an environement of graphical icons, menus, and windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why do most users rely on a GUI environment?

A

More user-friendly and requires less knowledge of the underlying command structure that controls the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a CLI?

A

Allows the users to interact with a network device directly by typing text commands to configure settings and manage security features on a cisco device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name at least one advantage and disadvantage of a CLI interface?

A

This type of interface needs much less memory (RAM) in order to use compared to other types of user interfaces. However, commands have to be typed precisely. If there is a spelling error the command will fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When would you have to use the console port rather than Telnet?

A

when you need to access a device directly, even if the device isn’t connected to its primary network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why is SSH not used instead of telnet all the time?

A

SSH protects user identities, passwords, and data from network snooping attacks, and allows secure logins and file transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the main Cisco iOS modes (describe…i.e. privileged exec, etc…), and which do you enter first when you access the CLI?

A

User EXEC: log in (Router>)
Priviledged EXEC: use the enable exec command (Router#)
Global Configuration: use the configure terminal command (Router(config)#)
Interface Configuration: use the interface command (Router (config-if)#)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three methods of accessing the Cisco IOS command line interface?

A

Console: access the CLI by connecting directly to the console port.
Telnet: access the CLI remotely using a telnet session.
SSH: access the CLI remotely during a SSH session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You know that there is a show (help) command that will show you the contents of the routing table, but you cannot remember which show command it is. What should you do?

A

“show IP route” or “show running-config”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do network operating systems enable users to do through a GUI?

A

interact with the system using an environment of graphical icons, menus, and windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which access method needs a physical connection in order to access network components?

A

Ethernet: ethernet is a networking standard that uses physical cables like twisted pair to connect devices on a network, meaning a direct wired connection is necessary to access network componenets using this method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What programs are used to connect to network devices and allow for enhancing productivity or changing fonts?

A

Terminal emulation programs such as PuTTY, Tera Term, and SecureCRT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are three popular terminal emulation programs?

A

PuTTY, Tera Term, and SecureCRT

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the two primary command modes for management access in network components?

A

User Exec Mode & Priviledged Exec Mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

How do you know which iOS mode you are working in (symbols, (config), etc…)?

A

Router(config)#: Global configuration mode
Router(config-if)#: Interface configuration mode
Router#: Privileged EXEC mode
Router>: User EXEC mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the prompt in privileged exec mode if the router’s name is Athens? (prompts are what you see before the command…look at the diagram in the text/slides about command lines syntax)

A

Athens#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What command would you enter in order to go to global configuration mode?

A

configure terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What is the prompt in global configuration mode if the router’s name is Athens?

A

Athens(config)#

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

What command exits the current configuration mode and returns to the pervious configuration mode?

A

the exit command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What command exits the current configuration mode and returns to EXEC mode?

A

the end command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What are the two most common sub-configuration modes and for what purpose are they used?

A

Interface sub-configuration mode & VLAN sub-configuration mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What components make up the command structure syntax?

A

Prompt Command Space Keyword or Argument
(ex. switch>ping 192.168.10.5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Why should each router and switch have a unique descriptive hostname?

A

A unique hostname makes it easier to identify and manage each router and switch within a network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What are the important guidelines for naming routers and switches?

A

-start with a letter
-contain no spaces
-end with a letter or digit
-use only letters, digits, and dashes
-be less than 64 characters in length

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What characterizes and determines strong passwords?

A

-more than eight digits in length
-upper and lower case
-variety
-avoid common words

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Describe a IPv4 subnet mask.

A

a 32-bit number created by setting host bits to all 0s and setting network bits to all 1s.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

How would I check to determine if a password is encrypted in IOS?

A

check the digit before the encrypted string in the configuration file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What are examples of end devices?

A

computers, smartphones, tablets, printers, scanners, etc

34
Q

How are IPv4 address represented?

A

four decimal numbers between 0-255 (ex. 192.0.2.146)

34
Q

A dotted-decimal notation indicates what type of address?

A

IPv4

35
Q

The IP address of the router that hosts (end devices) will use to access remote networks is called?

A

default gateway

35
Q

Coupled with IPv4 addressing, subnet mask determines what?

A

the network portion and host portion of an IP address

36
Q

How are IPv6 address represented?

A

eight groups of 16-bit hexadecimal numbers, seperated by colons. (ex. 2001:db8:1234::f350:2256:f3dd/64)

36
Q

What is an IPv6 address and how is it different than IPv4 addresses?

A

IPv4 is a 32 bit address, whereas IPv6 is a 128-bit hexadecimal address.

37
Q

Are IPv6 addresses case sensitive?

A

not case-sensitive and can be written in either lowercase or uppercase

38
Q

On what are network communications dependent?

A

Timing determines how fast bits are transmitted, when hosts can send data, and how much data can be sent at once.

39
Q

What are the differences between various types of media?

A

Physical composition, transmission method (electrical signals, light pulses), bandwidth capabilties, distance in limitations, and susceptibility to interference.

40
Q

What is the most common type LAN tehconology used today?

A

Ethernet is widely used for both wired and wireless networks, and is considered the standard LAN.

41
Q

What do protocols define?

A

a set of rules or a process or procedure of how to proceed or act

41
Q

What are the three elements of communication?

A

message source
destination
transmission medium

42
Q

Rules that are specific to the type of communication method being used are called?

A

protocols

43
Q

What are the four requirements to successfully deliver a message that is understood by the receiver?

A

an identified sender and receiver, a common language and grammar, speed and timing of delivery, and confirmation or acknowledgment requirements

43
Q

Be able to give or identify examples of organizations that standardize networking protocols.

A

Electronic Industries Alliance (EIA) or Institute of Electrical and Electronic Engineers (IEEE)

44
Q

Be able to give or identify several benefits of using layered models

A

Assist in protocol design because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below
Foster competition because products from different vendors can work together
Prevent technology or capability changes in one layer from affecting other layers above and below
Provide a common language to describe networking functions and capabilities

45
Q

Define and understand the common computer protocols surrounding network protocol requirements (3.1.6-3.1.10)***

A

Network Communications: enable two or more devices to communicate over one or more networks (TCP, HTTP, SMTP, etc..)
Network Security: secure data to provide authentication, data integrity, and data encryption (SSH, SSL, TLS)
Routing: enable routers to exchange route information, compare path information, and select best path (OSPF, BGP)
Service Discovery: used for the automatic detection of devices or services (DHCP, DNS)

46
Q

Sending a message over computer network typically requires several protocols, each with their own function, which is called what?

A

Protocol Suite

47
Q

What is a protocol suite?

A

A group of inter-related protocols necessary to perform a communication function
Sets of rules that work together to help solve a problem

48
Q

What concerns do lower and higher layers of protocol stacks give to moving data across the network? How do they differ?

A

Lower layers primarily focus on the physical transmission of data, ensuring bits are correctly sent across the network, while higher layers are concerned with application-specfic details like data integrity, sequencing, and error handling.

49
Q

What are/were the four competing protocol suites?

A

Internet Protocol Suite or TCP/IP: The most common protocol suite and maintained by the Internet Engineering Task Force (IETF)
Open Systems Interconnection (OSI) protocols: Developed by the International Organization for Standardization (ISO) and the International Telecommunications Union (ITU)
AppleTalk: Proprietary suite release by Apple Inc. (no longer used)
Novell NetWare: Proprietary suite developed by Novell Inc. (no longer used)

50
Q

Which are the main protocol suites in use today?

A

TCP/IP

51
Q

What are the characteristics of standards organizations?

A

-vendor-neutral
-non-profit organization
-established to develop and promote the concept of open standards
-Internet Society (ISOC)- Promotes the open development and evolution of internet
-Internet Architecture Board (IAB)- Responsible for management and development of internet standards
-Internet Engineering Task Force (IETF)- Develops, updates, and maintains internet and TCP/IP technologies
-Internet Research Task Force (IRTF)- Focused on long-term research related to internet and TCP/IP protocols

51
Q

Be familiar with protocol association with TCP/IP only (pp.101-103).

A

-Address resolution protocol (ARP)
-Internet control message protocol (ICMP)
-Reverse address resolution protocol (RARP)
-User Datagram Protocol (UDP)

52
Q

IP information added to the front of the TCP information which includes source and destination IP addresses in known as an ____________? (IP Packet) found in step 4 (you would not need to know the step number)

A

IP Header

53
Q

What protocol adds information to both ends of an IP Packet known as a data link frame?

A

The ethernet protocol

54
Q

If given a diagram of Protocol Encapsulation, you should be able to identify the terms associated with the diagram (i.e. the figures such as 3-16 p. 105)

A
54
Q

A __________ is a collection of media and intermediary devices?

A

network

55
Q

Why are standards and protocols important?

A

help ensure the integrity of connections and connected resources

55
Q

What are the 4 organizations involved with the development and support of the internet?

A

-W3C (Word Wide Web Consortium)
-ISO (International Organization for Standardization)
-IETF (Internet Engineering Task Force)
-NASA (National Aeronautics and Space Organzation)

56
Q

What are the 2 organizations involved with the development and support of the TCP/IP?

A

-The Defense Advanced Research Projects Agency (DARPA)
-Internet Engineerying Task Force (IETF)

57
Q

What is meant by the term ‘proprietary’?

A

proprietary to Cisco Systems and therefore not supported by other vendors.

57
Q

What encourages the interoperability, competition, and innovation of network components?

A
58
Q

What are the 4 organizations associated with electronic and communications standards?`

A

-Internet Society (ISOC): Promotes the open development and evolution of internet
-Internet Architecture Board (IAB): Responsible for management and development of internet standards
-Internet Engineering Task Force (IETF): Develops, updates, and maintains internet and TCP/IP technologies
-Internet Research Task Force (IRTF): Focused on long-term research related to internet and TCP/IP protocols

59
Q

What is a reference model and what is its purpose?

A

a conceptual framework that provides a standardized, high-level description of the key components and relationships within a specific system or domain, acting as a common reference point for understanding, communication, and comparison between different implementations within that domain

59
Q

What are the two primary models used when describing networking?

A

OSI/ISO model and the TCP/IP model

60
Q

What are the four layers of the TCP/IP model? What is done at each layer? Be able to name / identify the PDU (p. 119) for each layer.

A
  1. Link or access layer
  2. Internet layer
  3. Transport layer
  4. Application layer
60
Q

Be able to compare and contrast the OSI model and the TCP/IP model.

A

OSI has seven distinct layers while TCP only has four. with the OSI model providing a more detailed breakdown of network functions and the TCP/IP model being more focused on practical implementation and widely used in real-world networks

60
Q

What is meant by encapsulation? What is meant by decapsulation?

A

the process by which a device adds networking headers and trailers to data from an application for the eventual transmission of the data onto a transmission medium; decapsulation is a process by which an end device, after it receives data over some transmission medium, examines the headers and trailers at each successively higher layer and eventually hands the data to the correct application

61
Q

Be able to list and identify the seven layers of the OSI model (Hint: All People Seem To Need Data Processing). You should know the general function of each layer and with which number each layer is associated and what the lower layers are associated with which device (layers 1, 2 & 3).

A
  1. the physical layer
  2. the data link layer
  3. the network layer
  4. the transport layer
  5. the session layer
  6. the presentation layer
  7. the application layer
62
Q

What is multiplexing?

A

a process in which multiple digital data streams are combined into one signal

62
Q

What does the physical layer of the OSI model do?

A

responsible for the transmission of raw data bits across a physical medium

63
Q

Define segmentation of messages / what are the advantages of segmentation?

A

a strategy that involves dividing a computer network into smaller parts to improve security and network performance. Improves network performance and security.

64
Q

Why is a large message divided into pieces before it sent?

A

Helps avoid retransmission of the entire message if there is a problem.

65
Q

What is sequencing and what controls the sequence order?

A

the process of assigning a numerical order to entries within an Access Control List (ACL), which determines the order in which packets are inspected and either permitted or denied access to a network; the sequence order is controlled by the numerical value assigned to each ACL entry, with lower numbers being evaluated first

66
Q

What is a PDU—and no…I do not need the answer: Protocol Data Unit?

A

the basic unit of exchange between entities that communicate using a specified networking protocol

67
Q

What is the PDU for Layer 2 called? Other questions similar wording….

A

the protocol data unit for layer two, the data link layer, is called a frame

68
Q

What two things are needed to access a local network resource and what roles do they have?

A

a network adapter on your device, which allows it to connect to the network, and a valid network address (IP address) that uniquely identifies your device within that network, enabling other devices to send data to you

69
Q

What is a NIC?

A

a network interface card- a hardware component that allows a computer to connect to a network and exchange data with other devices

70
Q

What is responsible for delivering an IP packet from the original source to the final destination?

A

The internet protocol which operates at the network layer of the OSI model; utilizes routing mechanisms to navigate the network and forward the packet through various routers based on the destination IP address

71
Q

What is responsible for delivering the data link frame from one NIC to another NIC on the same network?

A

The data link layer of the OSI model, this is achieved through the Media Access Control (MAC) sublayer which manages access to the shared transmission medium, like the ethernet cable

72
Q

What address does a NIC encode in the data link layer?

A

The encoding of a MAC address on an NIC places it at that layer

72
Q

What do we call a ‘logical’ address and with what layer is it associated?

A

An IP address; is associated with the Network Layer (layer three) in the OSI model

73
Q

How can we determine if two devices are on the same network? Could you identify with an address only?

A

Compare their IP addresses; if the first few octets (number separated by dots) of the IP address match, then they are likely on the same network

73
Q

What do we call a ‘physical’ address and with what layer is it associated?

A

the MAC address and is associated with the Data Link Layer (Layer 2) of the OSI model

74
Q

What two parts do an IP address contain? (know and describe)

A

The network ID which identifies the specific network a device belongs to, and the host ID which identifies the unique device within that network

75
Q

An IP packet contains what two IP addresses? (know and describe)

A

The source IP address and the destination IP address

76
Q

What are data link addresses known as?

A

Media Access Control (MAC) addresses

77
Q

NIC cards are physically embedded with what address?

A

MAC address

78
Q

What are the roles of network layer (logical) and data link (physical) address on the same networks? Remote networks?

A

The data link layer address (physical address like a MAC) identifies a specific device within a network, while the network layer address (logical address, like an IP address) identifies a device across multiple networks, allowing data to be routed to the correct destination on a larger scale

79
Q

What is the unique role the data link layer (layer 2) physical address plays to deliver the data link frame from one network interface to another network interface?

A

the data link layer provides the functional and procedural means to transfer data between network entities, the MAC address uniquely identifies a network interface on a local network, allowing the data link layer to precisely direct a data frame to the intended device within that network