Intro Flashcards

1
Q

Peer to peer network characteristics

A

Lacks centralised administration
Easy to create
Less cost to implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intermediary devices

A

Connect individual hosts to the network

Direct the path of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Connection options that provide always-on, high-bandwidth internet connection to computers in a home office

A

Cable

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Functions provided to users by context-sensitive help feature of Cisco, IOS CLI

A

Displaying a list of all available commands in current mode.

Determining which option, keyword, or argument is available for the entered command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which two host names follow the guidelines for naming conventions on Cisco IOS devices

A

SW Branch 799

RM-3 Switch-2A4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How dose the (service password-encryption) enhance password security on Cisco routers and switches

A

Ot encryptions the passwords that are stored in router or switch configuration files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s are the 2 characteristics of RAM on a Cisco device

A

The contents of the RAM are lost during a power cycle.

The configuration that is actively running on the device is stored in the RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IOS modes

A
Int config mode
Priv exe mode 
Line config mode
Global config mode
User exe mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Client to webserver

Order of the protocol stack

A

HTTP
TCP
IP
Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 application layer protocols are park of the TCP/IP protocol suite

A

DHCP
DNS
FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the proprietary protocols

A

Protocols developed by organisations who have control over there definition and operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which 3 layers of the OSI model are comparable in function to the application layer of the TCP/IP model

A

Application
Presentation
Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

At which layer of the OSI model would a logical address be encapsulated

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which PDU (Protocol Data And Unit) format is used when bits are revived from network medium by the NIC of a host

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which characteristics describes the default gateway of a host computer

A

The logical address of the router interface on the same network as the host computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ISOC

A

Promotes the open development evolution and use of the internet throughout the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ISO

A

Largest developer of international standards in the world for a wide variety of products and services, known for OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IANA

A

Responsible for the overseeing and managing of IP addresses, domain name management and protocol identifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Throughput

A

Measure of bits transferred across the media over a given period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What interference would electrical cables and fluorescent lights have on CAT cabling

A

EMI

RFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data link layer provides

A

Accepts layer 3 packets and encapsulates them into frames.

Provides media access control and provides error detection:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is true concerning physical and logical topologies

A

Logical topologies refer to how a network transfers data between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Star topology

A

End devices connect to a central intermediate device, which in turn connects to other central intermediate devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is contained in the trailer of a data link frame

A

Error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What is the function of the CRC value that is found in the FCS field of a frame

A

To verify the integrity of the revived frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Data link sub layer that identifies the network layer protocol encapsulated in the frame

A

LCC logical link control

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Combination of point to point, HUB, spoke and mesh topology

A

Hybrid

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Ethernet frame sizes
MAX
MIN

A

1518

64

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Ethernet

A

Defines the most common type of LAN in the world.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Function and features of logical link control sub layer in Ethernet standards

A

LLC is implemented in the software.

The data link layer uses LLC to communicate with the upper layers of the protocol suite.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

MAC addresses

A

Must be globally unique

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Destination addresses used in ARP request frame

A

FFFF.FFFF.FFFF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

The potential network problems that can result from ARP operation

A

Network attackers could manipulate MAC addresses and IP addresses mappings in ARP messages with the intent of intercepting network traffic.
On large networks with a low bandwidth, multiple ARP broadcasts could cause data communication delays.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Collision fragment

A

Runt frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

On a Cisco switch,
WHAT?
memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports

A

Port-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

ARP
WHAT?
is a technique that is used to send fake ARP messages to the other hosts in the LAN. The aim is to associate IP addresses to the wrong MAC addresses

A

Spoofing

ARP poisoning

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Which statement is true about MAC addresses

A

The first three bytes are used by the vendor assigned OUI (Organisationally Unique Identifier)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

2 characteristics of IP

A

Operates independently of the network media.

Dose not require a dedicated end to end connection.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

When a connectionless protocol is in use of l lower layer of the OSI model, how is missing data detected and retransmitted

A

Upper layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Whatcha field in the IPv4 header is used to prevent a packet from transversing a network endlessly

A

Time-To-Live

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What IPv4 header field identifies the upper layer protocol carried in the packet

A

Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What is one advantage that the IPv6 simplified header offers over IPv4

A

Efficient packet handling

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What type of route is indicated by the code C in an IPv4 routing table on a Cisco router

A

Directly connected route

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What routing table entry has a next hop address associated with a destination network

A

Remote routes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Following default settings what is the next step in the router boot sequence after the los IOS loads from

A

Locate and load the startup config file from NVRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

2 types of router interfaces

A

WAN

LAN

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which 2 pieces of information are in RAM of a Cisco router during normal operation

A

Cisco IOS.

IP Routing Table.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

What is the purpose of the startup configuration file on a Cisco router

A

To contain the commands that are used to initially configure a router on startup.

50
Q

Which 3 commands are used to set up secure access to a router through a connection to the console interface

A

Login
Password Cisco
Line console 0

51
Q

Which characteristics describes an IPv6 enhancement over IPv4

A

The IPv6 header is simpler than the IPv4 header is, which improves packet handling

52
Q

How many bits in IPv4 address

A

32

53
Q

Which 2 parts are components of an IPv4 address

A

Network portion

Host portion

54
Q

What is the purpose of a subnet mask

A

To determine the subnet to which the host belongs

55
Q

A message sent to all hosts on a remote network

A

Directed broadcast

56
Q

What are the 3 characteristics of a multicast transmission

A

A single packet can be traced to a group of hosts.
Multicast transmissions can be used by routers to exchange routing information.
The range 244.0.0.0 to 244.0.0.255 is reserved to reach multicast groups on a local network.

57
Q

Which 2 IPv4 to IPv6 transition techniques manage the interconnection of IPv6 domains

A

Dual stack

Tunnelling

58
Q

Abbreviate 3FFE:1044:0000:00ab:0000:0000:0057

A

3FFE:1044:0:0:AB::57

59
Q

2 types of IPv6 unicast addresses

A

Loop back

Link local

60
Q

What are the 3 parts of an IPv6 global unicast address

A

A global routing prefix that is used to identify the network portion of the address provided by a ISP.
An interface ID that is used to identify networks inside of the local enterprise site.
A subnet ID that is used to identify networks inside of the local enterprise site.

61
Q

Which protocol supports stateless address auto configuration (SLAAC) for the dynamic assignment of IPv6 addresses to a host

A

ICMPv6

62
Q

What is the purpose of ICMP messages

A

To provide feedback of IP packet transmissions

63
Q

What is indicated by a successful ping to the ::1 IPv6 address

A

Up is properly installed on the host

64
Q

What field context is used by the ICMPv6 to determine that a packet has expired

A

Hop limit field

65
Q
  1. 254.1.5
  2. 0.2.123
  3. 2.6.255
  4. 19.20.5
  5. 0.0.1
A
Link local
Test net
Experimental
Private 
Loopback
66
Q

A user is using traceroot, at which point would a router stop forwarding the packet

A

When the value in the TTL field reaches Zero

67
Q

What is the result of connecting 2 or more switches together

A

The size of the broadcast domain is increased

68
Q

What are the 2 reasons network administrators nights want to create subnets

A

Imported network performance.

Easier to implement security policies.

69
Q

If a network device has a mask of

/28, how many IP addresses are available for hosts on the network

A

14

70
Q

How many bits must be borrowed from the host portion of an address to accommodate a router with 5 connected networks

A

3

71
Q

Last address (Broadcast)

A

(Net + Inc) -2

72
Q

Increment

A

256-Mask

73
Q

Host range

A

2 power of bits

/29 .248
11111000
E.g. 5 SN = 2 to the 5 = 32
3 host bits = 2 to the 3 = 8 -2(BC&NetID) =6

74
Q

IPv6

Global Unicast
Multicast
Link Local
Loopback Address

A

2&3001
FF
FE80
::1

75
Q

Router boot up

A

POST
Bootstrap loader
Load IOS
Config

76
Q

Port requested from IANA in order to be used with a specific application.

A

Registered

77
Q

Well known ports

A

0-1023

78
Q

Which factor determines TCP window size

A

Amount of data the destination can process at one time

79
Q

TCP session acknowledgement number represents

A

The next byte the destination expects to receive

80
Q

What information is used by TCP to reassemble and reorder received segments

A

Sequence numbers

81
Q

What dose TCP do if the sending source detects network congestion on the path to the destination

A

The source will decrease the amount of data it sends before it must receive acknowledgements from the destination

82
Q

3 application layers using TCP

A

SMTP
FTP
HTTP

83
Q

Well known port numbers registered Port numbers

HTTP Protocol standard

A

0-1023
1024-49151
80

84
Q

Associated application layer protocol

A

Telnet

DNS

85
Q

TCP/IP model layer used for formatting, compression and encryption

A

Application

86
Q

Characteristics of the application layer of the TCP/IP model

A

Closest to end user

The creation and maintenance of dialogue between source and destination applications

87
Q

SNMP

A

Simple Network Management Protocol

88
Q

Peer to peer

A

Data exchange between 2 devices without a server

89
Q

What do client/server and peer to peer network models have in common

A

Both models support devices in server and client roles

90
Q

IMAP

A

Messages are kept in servers until detected from client machine

91
Q

GET, PUT, POST

A

HTTP

92
Q

DHCP discover message

A

The message comes from a client seeking a IP address.

All hosts receive the message, but only a DHCP server replys

93
Q

Top level DNS domain

A

.com

94
Q

SMBP Simple Message Block Protocol

A

Clients establish a long term connection to servers

95
Q

Application layer protocol used to provide file share and print services to Microsoft applications

A

SMB

96
Q

GET message

A

HTTP request from client to server

97
Q

Firewall feature used to insure legitimate packets

A

State full packet inspection

98
Q

Pre SSH steps

A

Give router host and domain name.

Generate set of secret keys for encryption.

99
Q

CDP on Cisco device

A

CDP can be displayed globally or on a specific interface

100
Q

Arp-d command

A

ARP cache is cleared

101
Q

-6

A

Forces trace root to use IPv6

102
Q

Display log messages on remotely connected sessions using telnet or SSH

A

Terminal Monitor

103
Q

4 types of Network Attack

A

Reconnaissance
Access
DoS
Malicious Coda

104
Q

Access attacks

A
Password
Trust exploration 
Port exploration 
Port redirection 
Man in the middle
105
Q

Mitigating Network Attacks

A

Device hardening-Remove software not in use.
Antivirus
Personal firewalls
Operating system patches

106
Q

Private Addresses

A
  1. 0.0.0/8
  2. 16-31.0.0/16
  3. 168.0-255
107
Q

ICMP

A

Internet Control Message Protocol

108
Q

SVI

A

Switched Virtual Interface - Virtual LAN

109
Q

Secure access to 3rd party’s

A

Extranet

110
Q

Service password-encryption

A

Prevents a look over the shoulder on running config

111
Q

PDU

A

Protocol Data Unit

Packet

112
Q

Wireless

A

Radio Wave

113
Q

CSMA/CD

A

Carrier-Sense Multiple Access

Collision Detection

114
Q

ROM

A

Bootstrap.
Basic Diagnostic Software.
Limited IOS (Internetwork Operating System)

115
Q

RAM - Volatile

A

Running config.
IP routing table.
MAC mappings in ARP cache.

116
Q

NVRAM

A

Start up config

117
Q

Transport Layer

3services

A

Flow control.
Connection Establishment.
Error Recovery.

118
Q

DHCP

A

Default gateway address.

Subnet mask.

119
Q

Shell

A

Closet to the user

Between user and Kernel

120
Q

Kernel

A

Part of the OS.

121
Q

TCP

A

Transport Control Protocol