Networking Devices and Initial Configuration Flashcards

1
Q

network architecture

A

refers to the technologies that support the infrastructure and the programmed services and rules, or protocols, that move data across the network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

fault tolerant network

A

is one that limits the number of affected devices during a failure.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

network congestion

A

occurs when the demand for bandwidth exceeds the amount available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

The focus of QoS is to

A

prioritize time-sensitive traffic.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Quality of Service (QoS)

A

means that a router will manage the flow of data and voice traffic, giving priority to voice communications.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Network Confidentiality

A

Data confidentiality means that only the intended and authorized recipients can access and read data.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Network Integrity

A

Data integrity assures users that the information has not been altered in transmission, from origin to destination.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Network Availability

A

Data availability assures users of timely and reliable access to data services for authorized users.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

hierarchical network layer: Core

A

a high-speed backbone layer with redundant (backup) connections. It is responsible for transporting large amounts of data quickly between multiple end networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

hierarchical network layer: Distribution

A

provides a connection point for separate networks and controls the flow of information between the networks.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

hierarchical network layer: Access

A

provides a connection point for end user devices to the network and allows multiple hosts to connect to other hosts through a network device, usually a switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Type 1 Hypervisor

A

also called the “bare metal” approach because the hypervisor is installed directly on the hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Type 2 Hypervisor

A

is software that creates and runs VM instances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

SaaS

A

Software as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

PaaS

A

Platform as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

IaaS

A

Infrastructure as a Service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Public Clouds (1/4)

A

Cloud-based applications and services offered in a public cloud are made available to the general population.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Private Cloud (2/4)

A

Cloud-based applications and services offered in a private cloud are intended for a specific organization or entity, such as the government.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hybrid Cloud (3/4)

A

A hybrid cloud is made up of two or more clouds (example: part private, part public), where each part remains a separate object, but both are connected using a single architecture.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Community Clouds (4/4)

A

A community cloud is created for exclusive use by a specific community

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Hypervisor

A

a program, firmware, or hardware that adds an abstraction layer on top of the physical hardware.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Ethernet Protocols

A

define how data is formatted and how it is transmitted over the wired network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Logical Link Control (LLC) Sublayer

A

This IEEE 802.2 sublayer communicates between the networking software at the upper layers and the device hardware at the lower layers. It places information in the frame that identifies which network layer protocol is being used for the frame. This information allows multiple Layer 3 protocols, such as IPv4 and IPv6, to use the same network interface and media.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

MAC Sublayer

A

This sublayer (IEEE 802.3, 802.11, or 802.15 for example) is implemented in hardware and is responsible for data encapsulation and media access control. It provides data link layer addressing and is integrated with various physical layer technologies.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

IEEE 802.3 data encapsulation includes the following:

A

Ethernet Frame
Ethernet Addressing
Ethernet Error

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

collision fragment or runt frame

A

ethernet frames less than 64 bytes in length

27
Q

Ethernet Frame Field:
Preamble and SFD

A
28
Q

Ethernet Frame Field:
Des. MAC address

A
29
Q

Ethernet Frame Field:
Source MAC Address

A
30
Q

Ethernet Frame Field:
Type / Length

A
31
Q

Ethernet Frame Field:
Data Field

A
32
Q

Ethernet Frame Field:
Frame Check Sequence

A
33
Q

MAC address table aka

A

a content addressable memory (CAM) table

34
Q

IPV4 Header: Version

A

Contains a 4-bit binary value set to 0100 that identifies this as an IPv4 packet.

35
Q

IPV4 Header: Differentiated Services (DS)

A

Formerly called the type of service (ToS) field, the DS field is an 8-bit field used to determine the priority of each packet. The six most significant bits of the DiffServ field are the differentiated services code point (DSCP) bits and the last two bits are the explicit congestion notification (ECN) bits.

36
Q

IPV4 Header: Time To Live (TTL)

A

TTL contains an 8-bit binary value that is used to limit the lifetime of a packet. The source device of the IPv4 packet sets the initial TTL value. It is decreased by one each time the packet is processed by a router. If the TTL field decrements to zero, the router discards the packet and sends an Internet Control Message Protocol (ICMP) Time Exceeded message to the source IP address. Because the router decrements the TTL of each packet, the router must also recalculate the Header Checksum.

37
Q

IPV4 Header: Protocol

A

This field is used to identify the next level protocol. This 8-bit binary value indicates the data payload type that the packet is carrying, which enables the network layer to pass the data to the appropriate upper-layer protocol. Common values include ICMP (1), TCP (6), and UDP (17).

38
Q

IPV4 Header: Header Checksum

A

This is used to detect corruption in the IPv4 header.

39
Q

IPV4 Header: Source IPv4 Address

A

This contains a 32-bit binary value that represents the source IPv4 address of the packet. The source IPv4 address is always a unicast address.

40
Q

IPV4 Header: Destination IPv4 Address

A

This contains a 32-bit binary value that represents the destination IPv4 address of the packet. The destination IPv4 address is a unicast, multicast, or broadcast address.

41
Q

IPV6 Header: Traffic Class

A

same as IPv4 DS field

42
Q

IPV6 Header: Flow Label

A

This 20-bit field suggests that all packets with the same flow label receive the same type of handling by routers.

43
Q

IPV6 Header: Payload Length

A

This 16-bit field indicates the length of the data portion or payload of the IPv6 packet. This does not include the length of the IPv6 header, which is a fixed 40-byte header.

44
Q

IPV6 Header: Next Header

A

This 8-bit field is equivalent to the IPv4 Protocol field. It indicates the data payload type that the packet is carrying, enabling the network layer to pass the data to the appropriate upper-layer protocol.

45
Q

IPV6 Header: Hop Limit

A

This 8-bit field replaces the IPv4 TTL field. This value is decremented by a value of 1 by each router that forwards the packet. When the counter reaches 0, the packet is discarded, and an ICMPv6 Time Exceeded message is forwarded to the sending host,. This indicates that the packet did not reach its destination because the hop limit was exceeded. Unlike IPv4, IPv6 does not include an IPv6 Header Checksum, because this function is performed at both the lower and upper layers. This means the checksum does not need to be recalculated by each router when it decrements the Hop Limit field, which also improves network performance.

46
Q

IPV6 Extension Headers

A

Extension headers are optional and are placed between the IPv6 header and the payload. EHs are used for fragmentation, security, to support mobility and more.

47
Q

IPv6 Specs

A

128 bit address space
40 octets header
8 header fields

48
Q

IPv4 Specs

A

32 bit address space
20 octets header
12 basic header fields

49
Q

Address Resolution Protocol (ARP)

A

determine the destination MAC address of a local device when it knows its IPv4 address.

50
Q

newer Windows operating systems store ARP table entries between

A

15 and 45 seconds

51
Q

ARP Poisoning

A

This is a technique used by a threat actor to reply to an ARP request for an IPv4 address that belongs to another device, such as the default gateway.

52
Q

FQDNs

A

fully-qualified domain names (FQDNs), such as http://www.cisco.com,

53
Q

DNS Record Type: A

A

The end device for IPv4 Address

54
Q

DNS Record Type: NS

A

An authoritative name server

55
Q

DNS Record Type: AAAA

A

The end device for IPv6 Address (pronounced Quad-A)

56
Q

DNS Record Type: MX

A

The mail exchange record

57
Q

DHCP

A

for IPv4 service automates the assignment of IPv4 addresses, subnet masks, gateways, and other IPv4 networking parameters.

58
Q

DHCP for IPv6 (DHCPv6)

A

One important difference is that DHCPv6 does not provide a default gateway address. This can only be obtained dynamically from the Router Advertisement message of the router.

59
Q

The DHCPv4 messages are

A

DISCOVER, OFFER, REQUEST, ACKNOWLEDGE

60
Q

The DHCPv6 messages are

A

SOLICIT, ADVERTISE, INFORMATION REQUEST, and REPLY.

61
Q

The transport layer

A

is responsible for logical communications between applications running on different hosts

62
Q

Transport Layer Responsibilities (5)

A
  1. maintain and track these multiple conversations.
  2. divide the application data into appropriately sized blocks
  3. adds header information containing binary data organized into several fields to each block of data.
  4. separate and manage multiple communications with different transport requirement needs.
  5. segmentation and multiplexing to enable different communication conversations to be interleaved on the same network.
63
Q

TCP services:

A

1) Establish a session
2) Ensures reliable delivery
3) Provides same order delivery
4) Supports flow control