Ryan's Midterm Study Guide (Chpt 1-7 + 10) Flashcards
Ryan's Midterm Study guide. Chapters 1-7 + chapter 10.
What is a LAN?
A LAN is a Local Area Network. End devices connected to a single router that communicate with each other.
What is a WAN?
A WAN is a Wide Area Network. Usually a series of LANS connected by something (the internet is the worlds largest WAN. Other examples include cloud services) WANs are normally run and owned by a company or ISP.
What is the internet?
The internet is a massive WAN that connects thousands of LANs and WANs together.
What is an Intranet?
An Intranet is a group of LANs and WANs run by a single organization, and only accessed by members of that organization (Example, the network that doctors and nurses connect to at a hospital)
What is an Extranet?
An Extranet is an Intranet that members of the public have limited access to. (Example, Accessing your medical records through the My Health Portal login)
How do LANS and WANs interconnect on the internet?
LANs connect to each other via WANs. They use routers to connect to other networks. WANs are connected via cabling, fiber or wireless transmissions. They talk to each other over the Internet through a cloud.
What is a converged network?
A converged network is a network where multiple types of end devices all communicate. Converged networks share the same set of rules and standards to deliver voice, data and video over the same network infrastructure.
Describe Fault Tolerance.
Fault tolerance pertains to limiting the amount of devices affected during a failure. (example. offering data multiple paths it can take. if one fails, it switches to the next until finding one that works)
Describe QoS (Quality of Service)
QoS. Making sure a network can handle the stress that it is presented, and operate at an acceptable speed. The main focus of QoS is prioritizing time sensitive traffic.
Describe Scalability.
Scalability is the ability for a network to grow along with its user base. It must be able to take on new users and applications without disrupting current service.
What are the two main components of network security?
Network Infrastructure Security Hardware that prevents security breaches from occurring.
Network Information Security. Software that prevents security breaches from occurring.
Describe Basic network infrastructure and core security (confidentiality, integrity, availability)
Confidentiality: Information must only be shared with people who are meant to see it.
Integrity: Data must not be altered on its way to its destination, and has to be in its original state on arrival
Availability: Timely access to a network.
Name some basic threats to a network.
Viruses Worms, Trojan Horses Spyware Day Zero attacks ( attacks on the first few hours after a network goes live) DoS attacks (Denial of Service) Identity theft
Name some basic security threat solutions.
Antivirus, antispyware, firewall filtering, access control lists, intrusion prevention systems, VPNS.
What is the difference between a Physical topology and a Logical topology?
Physical Topology: Illustrates the Physical locations of devices and physical connections between them (cabling diagrams)
Logical Topology: Shows the Logical connections between devices (IP addressing, ports, gateways)
What is the main purpose of the Cisco IOS?
Allows you to configure routers and switches directly
Allows you to set up a network that isn’t currently connected via directly plugging into devices with a console cable.
Allows you to directly communicate with devices using keyboard commands.
What are the features and functions of the Cisco IOS?
The Cisco IOS allows users to use keyboard commands to run CLI based networking programs and view outputs on a monitor.
From User exec mode, what commands would you have to enter to assign a hostname and MOTD to a switch?
enable
config t
hostname name
banner motd #motd#
What command has to be punched in after assigning a password to the console?
login
What does the command copy run start do in the CLI?
Copy’s the running configuration to the startup configuration. In the case of a power cycle, the device will start from this config.
What command encrypts all plain text passwords in the CLI?
service password-encryption
What ways can you access the Cisco IOS for configuration purposes?
Via console connection physically to a device via a console cable.
Secure Shell (SSH) In band method for remotely creating a secure CLI connection and virtual interface over a network.
Telnet. Unsecure In band connection to a virtual interface. Like SSH but does not provide a secure encrypted connection.
How do you access privileged exec mode in the CLI?
From User exec mode, type the “enable” command
Which mode in the CLI is known as the “view only” mode?
User Exec. Enabled by pressing enter on connection to the CLI.