SEM1 Flashcards

1
Q

FTP Port Numbers protocol

A

20/21 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SSH port port

A

22 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Telnet port

A

23 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SMTP port

A

Simple Mail Transfer protocol | 25| TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS port

A

Domain Name system| 53 | UDP and TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DHCP port

A

Dynamic Host Configuration Protocol| 67 (server) 68 (client) | UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HTTP port

A

Hyper text Transfer protocol | 80 | TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

POP3

A

Post office protocol| 110| TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IMAP

A

Internet message access protocol | 143 | TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SNMP

A

Simple Network Management Protocol | 161 | UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTPS

A

Hyper Text Transfer Protocol Secure | 443 | TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IMAP description

A

Internet message access protocol |

Messages stay on the server until the client deletes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

POP3 description

A

pop3 by default deletes messages after they are downloaded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TFTP port

A

Trivial File Transfer protocol | 69 | UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPV6 address types

A

link local: FE80 or / 10 reserved 1111 1110 10 (FE80) links for two devices on the same network, internal
Global Unicast: routable on the web
Multicast: FF00::/8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Private IP adress range class A

A

10.0.0.0 /8 255.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

P IP address range class B

A

172.16.0.0 /12 255.240.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Pri address range class C

A

192.168.0.0/ 16 255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Class A range

A

0-127.255.255.255 first bit must be 0 /8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Class B range

A

128-191.255… first two bits must be 10 /16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Class C range

A

192-223.255… first three bits must be 110 /24

22
Q

Multicast range

A

224-239.255.. first 4 bits 1110

23
Q

experimental range

A

240-255.255.. first 4 bits are 1111

24
Q

IPV6 address char

A

128 bits represented by 8 blocks of 4 hexadecimal chars

25
Q

IPV4 char

A

0.0.0.0 - 255.255.255.255 /

32 bits

26
Q

network utilization terms

A

bandwidth: theoretical capacity of the network
Throughput: actual measure of data moving through interfaces
Goodput: throughput- overhead

27
Q

Describe the datalink layers sublayers

A

Link local control: interfaces with upperlayers to translate layer 2 to layer 3
MAC: interfaces with physical layer to tranlate packets to bits, in charge of encapsulation. customized encapsulation based on type of media being traversed

28
Q

IPV6 IP4 simeltaneous usage techniques

A

dual stack: computers are equipped to process both at the network layer
tunneling: ipv6 is tunnelled over IPv4 protocols
translation:

29
Q

collision mitigation

A

carries sense mutiple access collision avoidance: wireless

CSMA collision detection is wired

30
Q

what two criteria are used t ohelp select a network medium

A

the distance the network med can carry a signal

The environment in which the medium will be installed

31
Q

What is a shell and kernel

A

A shell interacts with the user and the kernel, it is the outer layer, usually a GUI interface
Ther kernel interacts with the hadware and the shell, users may adjust the kernel through CLI

32
Q

CTRL-C

A

exits congif and goes back to exec, when in setup aborts back to command prompt

33
Q

ctrl-z

A

EXITS any config and goes back to priv exec

34
Q

CTRL -SHIF-6

A

break from DNS tracerts and pings

35
Q

Hostname chars

A

-start with a letter
- contain no spaces
end with a letter or digit
use only letter digits and dashes
be less than 64 chars

36
Q

command to ecrypt all passwords

A

service-password-encryption

37
Q

SVI

A

Switch virtual interface: describes the vlan 1 which can be used to manage switches via in-band methods such as ssh an telnet

38
Q

IANA

A

Internet assigned numbers authority assigns protocol numbers ( registered ports) , domain names, and blocks IP addresses for RIRs (regional internet registries)

39
Q

Well known port number range

A

0-1023

40
Q

ipv6 improvemetns

A

simpler header with fewer fields for efficent packet handling, larger payload for increased throughput, way more address space, eliminates the need for NAT

41
Q

Storage on routers types

A

NVRAM, non vol storage for startup config file
Flash: non vol computer memory storage used for perm stor, contains the ios, logfiles, voice config files, html files, backup configs.
ROM: POST teset, limited ios as backup if full ios corrupted of deleted, bootup information
RAM: running config, ios image, routing table arp cache, packet buffer. All temp storage

42
Q

router boot process

A
  1. POST, then load bootstrap
  2. locate and load cisco ios software
  3. locate and load the startup config or enter setup mode
43
Q

post

A

power on self test, first in router bootup process. Checks the hardware components to ensure router is functioning.

44
Q

bootstrap

A

goes into actio after POST, get loaded from ROM into ram, main purpose is to locate the ios and load it into ram. Also loads the startup configuration file from nvram to ram.

45
Q

test-net address range

A

198.51.100/203.0.113/192.0.02/ all /24s

46
Q

link-local ipv4

A

169.254.0.0/16 this adress is also a sign that dhcp may not be working properly

47
Q

SLAAC

A

Stateles address autoconfig, uses icmpv6 ,no central server, uses the routing prefix and clients own eui 64 address

48
Q

data link layer

A

accept layer 3 packets and package them to frames
perpare network data for layer 1
allowing upper layers to access media
error detection

49
Q

min and max frame sizes

A

1518: bigger considered giant 64: less considered a runt

50
Q

What is needed to scale a network

A

network documentation, device inventory, budget, traffic analysis

51
Q

sercutiy commands to lock down a router

A

service-password-encryption
security-passwords min=length
login block-for t secs attempts n within tsecs
exec-timeout

52
Q

enable ssh

A

step 1: give the router a unique host name and configure the ip domain name

2: keys must be generated for router to encrypt ssh traffic. crypto generate rsa gen-keys
3: create a local database username in global config
4: enable ssh in the line vty, login local, transport input ssh

th router is now ready to use ssh