Short Questions Flashcards

1
Q

What do ICMP messages do?

A

Provides feedback about issues related to processing of IP packets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What ICMP messages do both IPv4 and IPv6 have?

A

Host Reachability, Destination or service unreachable and Time Exceeded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What two messages does Ping use?

A

ICMP Echo request and echo reply messages
Can test the internal configuration of ipv4 or ipv6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What does tracert do?

A

Generates a list of successfully reached hops along the specified path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are characteristics of scalable networks

A
  • They expand to support new users and applications
  • They expand without degrading the performance of existing services
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What does the router do?

A

Determines the path messages take through the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What internet connection options do not require physical cables?

A

Cellular and Satellite connections

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What do denial-of-service attacks do?

A

DOS attacks slow or crash processes on a network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

List the types of clouds

A
  • Private
  • Public
  • Community
  • Hybrid
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of access is secured through the enable secret command

A

Privileged exec mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is the function of the shell in the OS?

A

The shell is the interface between the computer and the user, with the CLI and GUI to request tasks from the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What type of switch interface has no port associated with it?

A

Switch Virtual Interfaces have no physical ports

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What type of communication sends messages to all devices on a LAN

A

Broadcast

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What are three benefits of using a layered network model

A
  • Prevents a technology that works in one layer from affecting another
  • Assists in protocol design
  • Visualises interactions between each layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the purpose of message encoding?

A

Encoding converts data into a suitable format for transmission over the medium

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is done to an IP packet before it is transmitted over the physical medium?

A

The IP packet is encapsulated in a layer 2 (data link) frame

17
Q

What is throughput

A

The measure of transfer of bits across the media over a given period of time. Is usually lower than bandwidth and measures overhead.

18
Q

What feature automatically negotiates the best speed an duplex setting between interconnecting devices

A

Autonegotiation

19
Q

List two methods for switching data between ports on a switch

A
  • Store and forward
  • Cut through switching
20
Q

How does an ethernet switch build its MAC Address table?

A

A switch dynamically builds its MAC address table by examining the source MAC Addresses of the received frames on a port.

21
Q

What improvements does IPv6 provide from IPv4

A
  • Improved packet handling
  • Increased address space
  • Eliminates need for NAT
22
Q

What field in an IPv4 packet is used by the router to determine if a packet has expired, and what field is used by IPv6 for the same?

A

IPv4 - Time To Live (TTL)
IPv6 - Hop Limit

23
Q

What information is provided by the ARP when an IPv4 packet is sent to a remote host

A

ARP provides the MAC Address of the closest router interface to the sender

24
Q

What are the two functions provided by ARP

A
  • Resolve an IP address to its MAC address
  • Maintain an ARP table which lists the pairs of addresses
25
Q

What ICMPv6 messages are used during the ARP?

A

Neighbour solicitation and neighbour advertisement messages

26
Q

Why is a layer 2 switch configured with a default gateway address

A

The switch has a default gateway address to enable remote management

27
Q

List the private address blocks of IPv4

A

10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16

28
Q

What is the special use of the link local addresses

A

[169.254.0.0 to 169.254.255.254]
Used by windows DHCP to self configure in case of no available DHCP servers

29
Q

What is the ANDing process performed for?

A

To identify the network address of the destination network

30
Q

What are the two types of IPv6 multicast addresses?

A
  • Well known
  • Solicited node
31
Q

What IPv6 multicast address is used for layer 3 to layer 2 address resolution

A

Well known

32
Q

How are the TTL filed and time exceeded message used by traceroute to identify the routers in the path?

A

The traceroute tool sends a packet with TTL 1 to the nearest router, which sends back the time exceeded message. This is repeated with an incrementing TTL count until either TTL maximum is reached or the destination host is reached

33
Q

What is a socket? what is a socket pair

A

The pair of source IP and port number or destination IP and port number is a socket. The client socket and server socket together form a socket pair

34
Q

What is the complete range of TCP and UDP ports

A

0 - 1023

35
Q

Which two flags are used in a TCP handshake to establish connectivity

A

ACK and SYN

36
Q

What operations are provided by TCP but not UDP

A
  • Provides reliability
  • Supports flow control
  • Numbering and tracking data segments
37
Q

What are the 3 services provided by the AAA framework

A

Authentication
Authorisation
Accounting

38
Q

What type of attack may involve the tools nslookup and fping?

A

Reconnaisance

39
Q

Which firewall type can mitigate DOS? and how?

A

Stateful packet inspection blocks unsolicited packages to mitigate DOS