Flackbox CCNA 200-301 v1.0 Flashcards
<div>Its seven-layered approach to data transmission divides the operations into specific related groups of actions at each layer.</div>
OSI Model
25be42c1a3764350893c38ff8ee2d6c9-oa-1
OSI Layer
25be42c1a3764350893c38ff8ee2d6c9-oa-2
OSI Layer
25be42c1a3764350893c38ff8ee2d6c9-oa-3
OSI Layer
25be42c1a3764350893c38ff8ee2d6c9-oa-4
OSI Layer
25be42c1a3764350893c38ff8ee2d6c9-oa-5
OSI Layer
25be42c1a3764350893c38ff8ee2d6c9-oa-6
OSI Layer
25be42c1a3764350893c38ff8ee2d6c9-oa-7
OSI Layer
13633472f782438c8a3fb4b127100eb3-oa-1
TCP/IP Stack
13633472f782438c8a3fb4b127100eb3-oa-2
TCP/IP Stack
13633472f782438c8a3fb4b127100eb3-oa-3
TCP/IP Stack
13633472f782438c8a3fb4b127100eb3-oa-4
TCP/IP Stack
<div>It is a protocol stack that consists of multiple protocols including TCP (Transmission Control Protocol) and IP (Internet Protocol).</div>
TCP/IP Stack
<div>Which OSI layer provides network services to the applications of the user?</div>
Application Layer
<div>Which OSI layer defines the specifications needed for activating, maintaining, and deactivating the physical link between end devices?</div>
Physical Layer
<div>This OSI layer defines services to segment, transfer and reassemble the data for individual communications between the end devices.</div>
Transport Layer
<div>This OSI layer provides connectivity and path selection between two host systems that may be located on geographically separated networks.</div>
Network Layer
<div>The Cisco operating system used on the majority of Cisco enterprise grade network devices.</div>
IOS
<div>Where is the IOS operating system image is stored?</div>
Flash
<div>Where is the startup configuration is stored?</div>
NVRAM
<div>This command drops you back to the Privileged Exec mode from any level.</div>
end
<div>What cable will you use for a direct connection to the console port on the router or switch?</div>
Console Cable
“What Cisco IOS command line mode is ‘Router>’ in?”
User Exec mode
“What Cisco IOS command line mode is ‘Router(config-if)#’ in?”
Interface Configuration mode
This command is used to go to the Privileged Exec mode from the User Exec mode.
enable
<div>This command makes the running configuration persistent across reboot.</div>
copy running-config startup-config or copy run start
“The ‘show’ command that displays the entire running configuration on the router.”
show running-config or show run
<div>The process of adjusting the flow of data from the sender to ensure that the receiving host can handle all of it.</div>
Flow Control
<div>The process by which a host is able to support multiple sessions simultaneously and manage the individual traffic streams over a single link.</div>
Session Multiplexing
<div>This OSI layer provides transparent transfer of data between hosts and is responsible for end-to-end error recovery and flow control.</div>
Transport Layer
“<span>Which</span>transport layer protocol<span>is used by TFTP</span><span>?</span>”
UDP
What does the acronym UDP stand for?
User Datagram Protocol
Which transport layer protocol sends traffic best effort? TCP or UDP?
UDP
<div>This transport layer protocol carries out sequencing to ensure segments are processed in the correct order and none are missing.</div>
TCP
<div>Which transport layer protocol is connection oriented? TCP or UDP?</div>
TCP
This transport layer protocol does <b>not</b> carry out sequencing to ensure segments are processed in the correct order and none are missing.
UDP
<div>Which transport layer protocolis not reliable, meaning the receiving host does not send acknowledgments back to the sender?</div>
UDP
Which transport layer protocol does <b>not</b> perform flow control? TCP or UDP?
UDP
Which transport layer protocol is reliable where lost segments are resent? TCP or UDP?
TCP
“<span>Which</span>transport layer protocol<span>is used by Telnet</span><span>?</span>”
TCP
<div>This OSI layer is responsible forrouting packets to their destination and for Quality of Service.</div>
Network Layer
What is1100 1011 in decimal?
203
What is 255.255.192.0 in slash notation?
/18
What is /27 in dotted decimal notation?
255.255.255.224
<div>This defines where the boundary between the IP address network portion and host portion.</div>
Subnet Mask
<div>Traffic with this as destination address will be sent to all hosts in the subnet.</div>
Broadcast Address
<div>This address class is reserved for IP multicast addresses.</div>
Class D
This address class is‘experimental and reserved for future use’.
Class E
<div>This address class is assigned to networks with a <b>very large</b> number of hosts.</div>
Class A
<div>What is the default subnet mask of Class A addresses?</div>
/8
What does IANA stand for?
Internet Assigned Numbers Authority
<div>This address class is assigned to <b>medium-sized to large-sized</b> networks.</div>
Class B
<div>What is the valid network address range of Class B?</div>
128.0.0.0to191.255.0.0 /16
<div>This address class is used for <b>small </b>networks.</div>
Class C
<div>These addresses are valid to be assigned to hosts but they are not routable on the public internet.</div>
Private Addresses
What is the Class A private IP address range?
<div>10.0.0.0 to 10.255.255.255</div>
What is the Class B private IP address range?
<div>172.16.0.0 to 172.31.255.255</div>
What is the Class C private IP address range?
192.168.0.0 to 192.168.255.255
What is the Class E IP address range?
<div>240.0.0.0 to 255.255.255.255</div>
<div>What does CIDR stand for?</div>
Classless Inter-Domain Routing
<div>This allows us to size subnets differently according to how many hosts they have.</div>
Variable Length Subnet Masking (VLSM)
e7310797b17246ad9c64abaed64ef965-ao-1
Subnetting
e7310797b17246ad9c64abaed64ef965-ao-2
Subnetting
What network does 192.123.45.67 255.255.255.192 belongs to?
192.123.45.64 /26
How many usable IP addresses are in a /27 network?
30 hosts
“You are asked to subnet 10.150.100.0/24 using VLSM, which office would you allocate the first subnet to?<br></br><img></img>”
Management Office
How many subnets are available in 172.205.7.0 /25?
512
What is the usable IP address range of172.80.250.148 255.255.224.0?
172.80.224.1 - 172.80.255.254
What is the broadcast address of10.64.250.14 255.192.0.0?
10.127.255.255
What is the valid IP address range of126.12.16.0 255.255.254.0?
126.12.16.1 - 126.12.17.254
68292c91321b4dc4b3f22fe411c7852b-ao-1
VLSM Subnetting
68292c91321b4dc4b3f22fe411c7852b-ao-2
VLSM Subnetting
68292c91321b4dc4b3f22fe411c7852b-ao-3
VLSM Subnetting
68292c91321b4dc4b3f22fe411c7852b-ao-4
VLSM Subnetting
68292c91321b4dc4b3f22fe411c7852b-ao-5
VLSM Subnetting
68292c91321b4dc4b3f22fe411c7852b-ao-6
VLSM Subnetting
How many subnet bits do 100.1.1.0 255.255.240.0 have?
12
How many host bits does 172.17.7.2 255.255.255.128 have?
7
<div>Error detection and correction for the Physical Layer can be provided in this OSI layer.</div>
Data Link Layer
<div>How many bits does a MAC address have?</div>
48 bits
What does MAC stand for?
Media Access Control
The term for the message in the Data Link Layer.
Frame
What part of Ethernet header is at the start?
Preamble
Which Ethernet header part helps the sender and the receiver to synchronize?
Preamble
What does the acronym FCS stand for?
Frame Check Sequence
The MAC address is how many bytes long?
6 bytes
In the MAC address BC:54:2F:70:E2:43, what is theOUI portion?
BC:54:2F
In the MAC address 08:97:98:AC:2E:95, what is the vendor assigned portion?
AC:2E:95
This OSI layer puts the actual bits onto the wire.
Physical Layer
<div>This OSI layer provides thehardwaremeans of sending and receiving data, including defining cables, interface cards and physical aspects.</div>
Physical Layer
What does UTP stand for?
Unshielded Twisted Pair
<div>These type of cables are used to connect an end device such as a PC or router to a switch.</div>
Straight-through cables
<div>These cables are most often used to connect two devices of the same type directly, like two switches to each other.</div>
Crossover cables
This fiber cable type is more expensive and supports higher bandwidth and longer distances.
Single Mode
What does PoE stand for?
Power over Ethernet
It delivers power to the devices over the standard network cable. It that saves you having to use a separate power supply for all connected devices.
Power over Ethernet (PoE)
“What’s the maximum length of UTP cables?”
100 meters
Hubs operate in this duplex mode.
Half-duplex
“In this duplex mode, the attached hosts can either send or receive data. They can’t do both at the same time.”
Half-duplex
What does the acronym CSMA/CD stand for?
Carrier-Sense Multiple Access with Collision Detection
When operating in this duplex mode, the attached host can both send and receive data at the same time using their receive and transmit wires.
Full-duplex
With this duplex mode, all hosts have their own dedicated collision domain.
Full-duplex
“With Auto MDI-X disabled, what UTP cable is used to connect the device below?<br></br><img></img>”
Crossover cable
“With Auto MDI-X disabled, what UTP cable is used to connect the devices below?<br></br><img></img>”
Straight-through
What connector type is on the end of standard UTP cable?
RJ-45
This fiber cable type supports a few hundred meters maximum distance.
Multi Mode
<div>These are advanced switches that are Layer 3 aware and can route traffic between different IP subnets.</div>
Layer 3 switches
“The switch MAC address table is empty. PC2 sends traffic to PC3. What MAC address will the switch enter in the MAC address table?<br></br><img></img>”
0002.2222.000B
“The switch MAC address table is empty. PC2 sends traffic to PC3. What Port will the switch enter in the MAC address table?<br></br><img></img>”
F0/2
“PC1 receives a frame with a destination MAC address of 0003.3333.000C. What will PC1 do with the frame?<br></br><img></img>”
Discard/Drop the frame
“The switch MAC address table has a single existing entry of 0001.1111.000A mapped to Port F0/1. PC4 sends traffic to PC1. What MAC address will the switch enter in the MAC address table?<br></br><img></img>”
0004.4444.000D
“The switch MAC address table has an existing entry of 0003.3333.000C mapped to Port F0/3. PC1 sends traffic to PC3. Which port/s will the switch forward the traffic to?<br></br><img></img>”
F0/3
The switch is just plugged into the network. It receives a frame with a source MAC address of 1001.00A5.30A9 and a destination MAC address of 505C.1000.F008. What MAC address will the switch enter on its MAC address table?
1001.00A5.30A9
What doesFQDN stand for?
Fully Qualified Domain Name
What resolves an FQDN to an IP address?
Domain Name System (DNS)
<div>This is used to map the IP address to MAC address.</div>
Address Resolution Protocol (ARP)
What does ARP stand for?
“<span>Address Resolution Protocol</span>”
What commands are entered on a router for it to be able to resolve hostnames?
ip domain-lookup
“You are tasked to create a primary domain named ‘flackbox.com’. What command will you enter?”
ip domain-name flackbox.com
What command is entered on a router for it to act as a DNS server?
ip dns server
“What command is entered on the DNS-Clientto allow it to look up or send DNS queries to DNS-Server?<br></br><img></img>”
ip name-server 172.16.1.1
“PC1 sends an ARP Request to PC2. PC1 don’t know PC2’s MAC address yet. What will be the Destination MAC of the ARP Request?<br></br><img></img>”
FFFF.FFFF.FFFF
“PC1 wants to send a packet to PC2. The ARP Request will be sent to what IP address?<br></br><img></img>”
192.168.1.1
453b9e33735040b39cbdbce3531723f1-ao-1
ARP Reply
453b9e33735040b39cbdbce3531723f1-ao-2
ARP Reply
“PC1 sends an IP packet to PC2. What is the Source IP Address?<br></br><img></img>”
192.168.1.10
“PC1 sends an IP packet to PC2. What is the Destination IP Address?<br></br><img></img>”
192.168.1.20
Ping uses what protocol?
ICMP (Internet Control Message Protocol)
This command does a ping, hop by hop, from the source to the destination, and it will often indicate which router along the path has got the problem.
Traceroute
The Cisco troubleshooting methodology thatstarts off at the Application Layer then moving down through the layers.
Top Down Approach
The Cisco troubleshooting methodology thatstarts at the Physical Layer then moving up through the layers.
Bottom Up Approach
“Router1 has the following Ping results. Which router is the most likely to have a problem?<br></br><img></img>”
Router3
What does SVI stand for?
Switched Virtual Interface
<div>This command configures a descriptive hostname that makes it easier to identify the device.</div>
hostname
<div>This Cisco proprietaryLayer 2 protocol is used to share information with other directly connected Cisco equipment, such as theoperating systemversion andIP address.</div>
Cisco Discovery Protocol(CDP)
<div>This is an open standardprotocol which provides similar information to CDP.</div>
LLDP (Link Layer Discovery Protocol)
What command will you enter to configure the IP address 10.128.254.255 /30 on an interface?
ip address 10.128.254.255 255.255.255.252
This command is used to configure the default gateway.
<div>ip default-gateway</div>
What command will set the interface to full duplex?
duplex full
What command is entered on the interface level to configure a speed of 100 Mbps?
speed 100
This command enables auto duplex configuration.
duplex auto
This command shows the entire running configuration on the device.
show running-config
This command shows you the version of IOSthat is running on the device. It will also show additional informationlike how much memory is installed in the device.
show version
CDP stands for?
Cisco Discovery Protocol
To disable CDP at the interface level, this command is used.
no cdp enable
<div>This show interface brief command output indicates a Layer 2 issue or speed mismatch.</div>
up/down
<div>IPv6 standards state that addresses assigned to individual hosts should use this mask.</div>
/64
<div>Global Unicast Addresses are assigned from this range.</div>
2000::/3
This command enables IPv6 routing.
<div>ipv6 unicast-routing</div>
<div>These Neighbor Discovery message types are sent to the Solicited-Node multicast address which reaches all hosts on the subnet.</div>
NeighborSolicitation messages
<div>It is the IPv6 version of ARP.</div>
NeighborDiscovery
<div>These IPv6 addresses are similar to IPv4 RFC 1918 private addresses. They are not publicly reachable.</div>
Unique Local Addresses
<div>These IPv6 addresses are valid for communications on that link only.</div>
Link local addresses
What is the host portion of this IPv6 address 2001:100B:00D8:35A3:C004:7B01:09F0:1C01 /64?
C004:7B01:09F0:1C01
What is the network potion of this IPv6 address 2001:26CC:0F1D:C001:D330:5AF7:11A2:8000 /64?
2001:26CC:0F1D:C001
What is the long format of 2001:F:12::34:0:A3?
2001:000F:0012:0000:0000:0034:0000:00A3
<div>These IPv6 addresses are mandatory on IPv6 enabled interfaces.</div>
Link local addresses
<div>This is means Unspecified address or Unknown address. Itis also used as the source when an interface is trying to acquire an address.</div>
::
<div>This provides a virtual tunnel between private networks across a shared public network such as the Internet.</div>
Virtual Private Network(VPN)
<div>This Site-to-Site VPN configuration option is open standard and it does not support multicast.</div>
IPsec Tunnel
This is a Cisco proprietary Site-to-Site VPN configuration option, which provides scalable simple hub and spoke style configuration enables direct full mesh connectivity between all offices.
DMVPN (Dynamic Multipoint VPN)
<div>This Site-to-Site IPsec VPN configuration option is Cisco proprietary. It enables scalable centralised policy for VPN over non-public infrastructure.</div>
GETVPN (GroupEncrypted TransportVPN)
<div>This WAN connectivity option uses a shared core infrastructure at the service provider. It can be used for connectivity to the Internet and/or connectivity between offices over VPN.</div>
MPLS
What does the acronym MPLS stand for?
Multi Protocol Label Switching
“It combines or ‘multiplexes’ multiple optical signals into one optical signal transmitted over a single fiber strand.”
DWDM (Dense Wavelength Division Multiplexing)
<div>These routers do not run MPLS but they peer at Layer 3 with the provider PE routers.</div>
Customer Edge (CE) routers
What does the acronym DSL stand for?
<div>Digital Subscriber Line</div>
<div>These attacks are directed against a particular individual or organisation. Skilled attackers will typically start off with low impact reconnaissance.</div>
Targeted Attacks
<div>It is a derogatory term for low skilled attackers who download and use off-the-shelf hacking software to launch exploits.</div>
Script Kiddies
<div>This type of malware encrypts data with the attacker’s key and asks the victim to pay a ransom to obtain the key.</div>
Ransomware
<div>It is a Social Engineering attack where the victim is often directed to enter their personal details into the attacker’s website which looks like the reputable company’s legitimate website.</div>
Phishing
<div>It sits alongside the traffic flow and informs security administrators of any potential concerns.</div>
Intrusion Detection System (IDS)
It sits inline with the traffic flow and can also block attacks.
Itrusion Prevention System (IPS)
<div>It transforms readable messages into an unintelligible form and then later reverses the process</div>
Cryptography