ICND-1 (Cram Guide) Flashcards

1
Q

All People Seem To Need Data Processing

A
Application
Presentaion
Session
Transport
Network
Data Link
Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Don’t Some People Fry Bacon

A
Data
Segments
Packets
Frames
Bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provides services to lower layers. Enables program-to-program communication and determines whether sufficient resources exist for communication. Examples are e-mail gateways (SMTP), TFTP,
FTP, and SNMP.

A
  1. Application Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Presents information to the Application Layer. Compression, data conversion, encryption, and standard formatting occur here. Contains data formats JPEG, MPEG, MIDI, and TIFF.

A
  1. Presentation Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Establishes and maintains communication ‘sessions’ between applications (dialogue control). Sessions
can be simplex (one direction only), half duplex (one direction at a time), or full duplex (both ways simultaneously). Session Layer keeps different applications data separate from other applications.
Protocols include NFS, SQL, X Window, RPC, ASP, and NetBios Names.

A
  1. Session Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Responsible for end-to-end integrity of data transmissions and establishes a logical connection between sending and receiving hosts via ‘virtual circuits.’ Windowing works at this level to control how much information is transferred before acknowledgement is required.
Data is segmented and reassembled at this layer. Port numbers are used to keep track of different conversations crossing the network at the same time. Supports TCP, UDP, SPX, and NBP. Segmentation works here (Segments) and error correction (not detection).

A
  1. Transport Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Routes data from one node to another and determines the best path to take. Routers operate at this level. Network addresses are used here, which are used for routing (Packets). Routing tables, subnetting, and control of network congestion occur here. Routing protocols, regardless of which protocol they run over, reside here: IP, IPX, ARP, IGRP, and Appletalk.

A
  1. Network Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sometimes referred to as the LAN layer. Responsible for the physical transmission of data from one node to another. Error detection occurs here. Packets are translated into frames here and hardware address is added. Bridges and switches operate at this layer.

A
  1. Data Link Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Manages communications between devices over a single link on a network. Uses Service Access Points (SAPs) to help lower layers talk to the Network Layer.

A

Logical Link Control sublayer (LLC) 802.2:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Builds frames from the 1s and 0s that the Physical Layer
(address = 6 byte/48 bit) picks up from the wire as a digital signal and runs a Cyclic Redundancy Check (CRC) to assure no bits were lost or corrupted.

A

Media Access Control sublayer (MAC) 802.3:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Puts data onto the wire and takes it off. Physical Layer specifications, such as the connectors, voltage, physical data rates, and DTE/DCE interfaces. Some common implementations include Ethernet/IEEE 802.3, FastEthernet, and Token Ring/IEEE 802.5.

A
  1. Physical Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Purpose is to switch traffic as quickly as possible. Fast transport to enterprise services (Internet, etc.). No packet manipulation, VLANs, access-lists. High-speed access required, such as FDDI and ATM.

A

Core Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Time-sensitive manipulation, such as routing, filtering, and WAN access. Broadcast/multicast, media translations, security.

A

Distribution Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Switches and routers; segmentation occurs here, as well as workgroup access. Static (not dynamic) routing.

A

Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP/IP port 20

A

File Transfer Protocol – Data (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP/IP port 21

A

File Transfer Protocol – Control (TCP) (Listens on this port)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TCP/IP port 22

A

SSH (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP/IP port 23

A

Telnet (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP/IP port 25

A

Simple Mail Transfer Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TCP/IP port 53

A

Domain Name Service (TCP/UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP/IP port 69

A

Trivial File Transfer Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TCP/IP port 80

A

HTTP/WWW (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TCP/IP port 110

A

Post Office Protocol 3 (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TCP/IP port 119

A

Network News Transfer Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
TCP/IP port 123
Network Time Protocol (UDP)
26
TCP/IP port 161/162
Simple Network Management Protocol (UDP)
27
TCP/IP port 443
HTTP over Secure Sockets Layer (HTTPS) (TCP)
28
Protocol 6) Reliable, sequenced, connection-oriented delivery, 20-byte header.
TCP
29
(Protocol 17) Connectionless, unsequenced, best-effort delivery, 8-byte header. Sends data but does not check to see whether it is received.
UDP
30
Used to connect to a remote device (TCP). A password and username is required to connect. Telnet tests all seven layers of the OSI model.
TELNET
31
Connection-orientated (TCP) protocol used to transfer large files.
FTP
32
Connectionless (UDP) protocol used for file transfer.
TFTP
33
Allows remote management of network devices.
SNMP
34
Supports packets containing error, control, and informational messages. Ping uses ICMP to test network connectivity.
ICMP
35
Used to map an IP address to a physical (MAC) address. A host wishing to obtain a physical address broadcasts an ARP request onto the TCP/IP network. The host replies with its physical address.
ARP
36
Resolves hostnames to IP addresses (not the other way around). To configure the router to use a host on the network, use the command ROUTER(config)#ip name-server 4.2.2.2, and to configure DNS, use the command ip name-server (usually already turned on for the router configuration by default). If you want hosts on the network to use the router as a proxy DNS server, put the command Router(config)#ip dns server onto the router.
DNS
37
Involves a central server, or devices, which relays TCP information to hosts on a network. You can configure a router to be a DHCP server with the configuration below. You must have hosts on the same LAN as the router interface:
DHCP
38
Router(config)#ip dhcp pool E00_DHCP_Pool Router(dhcp-config)#network 10.10.10.0 255.255.255.0 Router(dhcp-config)#dns-server 24.196.64.39 24.196.64.40 Router(dhcp-config)#domain-name mydomain.com Router(dhcp-config)#default-router 10.10.10.254 Router(dhcp-config)#lease 1
DHCP
39
Router>
User EXEC:
40
Router#
Privileged EXEC:
41
Router(config)#
Global Configuration
42
> or rommon>
ROM Monitor
43
Ctrl+W
Erases a word
44
Ctrl+U
Erases a line
45
Ctrl+A
Moves cursor to beginning of line
46
Ctrl+E –
Moves cursor to end of line
47
Ctrl+F (or right arrow) –
Moves forward one character
48
Ctrl+B (or left arrow) –
Moves back one character
49
Ctrl+P (or up arrow) –
Recalls previous commands from buffer
50
Ctrl+N (or down arrow) –
Returns to more recent commands in buffer
51
Esc+B –
Moves back one word
52
Esc+F –
Moves forward one word
53
Tab
Completes a command you have started
54
show version
Shows information about IOS in RAM and displays how much physical memory is installed. Also shows the configuration register setting
55
show process
Shows information about programs running in DRAM.
56
show running-configuration
Shows active configuration in DRAM
57
show memory/stacks/buffers
Command used to view tables and buffers.
58
Stores router’s startup configuration. Does not lose data when powered off due to a battery power source:
NVRAM
59
EEPROM or PCMCIA card holds the compressed operating system image (IOS). This is where software upgrades are stored:
Flash
60
Contains power on diagnostics, a bootstrap program, and a mini-IOS (rommon). You can specify which file the routers boots from if you have more than one in flash memory:
ROM
61
A PC connected to the console port via a rollover cable. Used for initial configuration or disaster recovery.
Console port
62
Normally accessed by telnetting to the router. Five lines available, numbered 0 to 4 (more lines possible, depending on the Router/Switch model).
Virtual terminals
63
Normally a modem connected to this port.
Auxiliary port
64
The router can get its configurations or IOS from a server (a PC, for example) running TFTP software and holding the necessary files.
TFTP server
65
Network management station. Uses SNMP to manage the router normally via a web-style interface.
NMS
66
it allows you to gather information about other routers and switches. It is enabled by default. It can also be a very useful command to use while troubleshooting to see which devices are directly connected to the device you are connected to.
Cisco Discovery Protocol (proprietary) runs only on Cisco devices
67
Command to displays the neighbouring router or switch’s hostname, hardware platform, port identifier, and capabilities list:
Router#show cdp neighbors
68
To turn off CDP on an interface,
Router(config-if)#no cdp enable
69
To turn off CDP on your entire router or switch,
Router(config)#no cdp run
70
A LAN switch has three primary functions:
1. Address learning – Maintains a table (CAM – Content Addressable Memory) of addresses and on which port they can be reached. 2. Forward/filter decision – Forwards frames only out of the relevant port. 3. Loop avoidance – STP.
71
The switch copies the entire frame into its buffer and computes the CRC. The frame is discarded if there is an error. High latency.
Store-and-Forward
72
Reads only the destination address (first 6 bytes after preamble), looks up address, and forwards frame. Lower latency.
Cut-through
73
The switch reads the first 64 bytes before forwarding the frame. Collisions normally occur within the first 64 bytes.
Fragment-free
74
command to switch default gateway
Switch(config)#ip default-gateway 192.168.1.1
75
Switch#show mac-address-table dynamic
shows MAC table (dynamic)
76
Switch(config-if)#switchport port-security
enable port security
77
Switch(config-if)#switchport port-security violation shutdown
shutdown the port if some event occur
78
Switch(config-if)#switchport port-security maximum 4
only 4 MACs
79
Switch(config-if)#switchport port-security mac-address xxx
enter de mac that is allowed to use that interface
80
Switch #show port-security
show all security config. that was setted
81
Router(config)#ip route {destination network}{mask}{next hop address} e.g. ip route 172.16.5.2 255.255.255.0 172.16.12.8
Static routing
82
Router(config)#router rip Router(config-router)#version 2 Router(config-router)#network 172.16.0.0 Router(config-router)#no auto-summary (optional)
Dynamic addressing uses a routing protocol: | for RIP v2
83
RIP v2 (facts)
```  Uses UDP port 520  Classless  Max hop count is 15  Multicasts route updates to 224.0.0.9  Supports authentication  Update timer, 30 seconds  Invalid, 90 seconds  Hold down, 180 seconds  Flush, 270 seconds ```
84
Protocol that understand the direction and distance to any given network connections
Distance Vector protocols
85
Problems with Distance Vector protocols include _______ _____ and ______ to ______.
routing loops and | counting to infinity
86
For all configurations, you must specify which interfaces are internal for NAT and which are external:
Router(config-if)#ip nat inside/outside
87
Static NAT – Maps one address to one address, such as 192.168.1.1 to 200.1.1.1
outer(config)#ip nat inside source static 192.168.1.1 200.1.1.1
88
Maps a number of internal addresses to a pool of external addresses
Dynamic NAT
89
Router(config)#ip nat pool ad_team 10.0.0.1 10.0.0.10 prefix-length 24 Router(config)#ip nat inside source list 1 pool ad_team out Router(config)#access-list 1 permit 192.168.1.0 0.0.0.255
The configuration below creates a pool of 10 addresses with a mask (prefix length) of 255.255.255.0 and the name ‘ad_team.’ The hosts that will go through NAT are on the 192.168.1.0 network.
90
The two methods for wireless authentication are ___ ______ and ______ _____
open system and shared key.
91
the host sends an association request to the wireless access point and it will be sent a success or failure message
open-system | method (Wireless)
92
a key or pass phrase is configured on both the host | and the access point
shared-key method (Wireless)
93
There are three types of shared-key authentication
WEP, WPA, and WPA2
94
Is an encryption algorithm built in the 802.11 standard. It uses RC4 40-bit or 104-bit keys and a 24-bit initialisation vector.
WEP
95
uses dynamic key management, adds a stronger encryption cipher, and is built on the EAP/802.1X mechanism. It uses Temporal Key Integrity Protocol (TKIP), and the Initialization Vector is increased to 48-bit (more than 500 trillion key combinations). It is used with RADIUS in the enterprise
WPA
96
It uses even stronger encryption than WPA and this is achieved by using the Advanced Encryption Standard (AES). In addition, WPA2 creates a new key for every new association. This is a benefit over WPA in that the client’s keys are unique and specific to that client.
WPA2 is the next generation in wireless security.
97
command to encrypt all the passwords
service password-encryption
98
Router(config)#enable password {password}
Enable – Used to get from User Exec mode to Privileged Exec mode. Not encrypted.
99
Router(config)#enable secret {password}
Enable secret – Encrypts password (only use enable or enable secret, not both):
100
Router(config)#line vty 0 4 Router(config-line)#password cisco Router(config-line)#login
VTY – Needed if Telnet access is required:
101
If you want to permit SSH into the router or switch Telnet lines, then you need to add the command
transport input ssh to the VTY lines.