CISCO Exam 4 Flashcards

1
Q

Subnetting Information

A

fu = n + 1
br = n2 - 1
lu = br - 1

subnet: 1 2 4
host: 256 128 64
mask: 24 25 26

Question for Stokes: How many subnets for 2 hosts?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Broadcast Domain

A

Interface that Routers send broadcasts to

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

anycast

A

multiple devices with same address. Sent to closest device.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are GUAs?

A

ipv6 public addresses

Global Routing Prefix ~ provider assigned
Subnet/Interface ID ~ identifies subnet and host

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Local Link Address

A

Communication on same link/subnet. FE80::

all ipv6 need LLA.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Unique Local Address

A

FC00 – FDFF

communication of nodes on different links/subnets

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

RS
RA

A

hosts ask router for addressing
router sends to host nodes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

How are Local Link Addresses Configured?

A
  1. EUI-64 ~ adds bits to mac address
  2. Random interface ID
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

How are GUAs dynamically configured

A
  1. SLAAC ~ everything
  2. SLAAC Stateless ~ some from dhcp
  3. Stateful ~ everything from dhcp but default gateway
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

How to verify ipv6 address?

A

show ipv6 route
show ipv6 interface brief

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

ipv6 multicast address types

A

well known

solicited node

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the two common IPv6 assigned multicast groups?

A

FF02::1 – All nodes
FF02::2 – All routers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

ICMP

A

Internet Control Message Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Traceroute

A

Gives path that packet hopped on

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DAD

A

Detects Duplicate Addresses

(Duplicate Address Detection)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Transport Layer Protocols

A

TCP (Slow and Thorough)
-Large Header

UDP (Fast and Sloppy)
-Small Header

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Port Numbers

A

Identify application in system

18
Q

Socket Pair

A

Pair of source and destination port/ip addresses.

19
Q

Port Group

A

1023
49151
65000

20
Q

Legacy Classful Addressing

A

127
191
223
239
254

21
Q

netstat

A

Lists protocols in use

22
Q

TCP Flow Controls

A

Window Size ~ Determines the number of bytes that can be sent before expecting an
acknowledgement

Segment Size

Congestion Control ~ Limits data sent if not receiving acknowledgment

23
Q

RST

A

Reset Connection

24
Q

Presentation Layer

A

Presents data properly

25
Q

Application Layer

A

Communicates between application and network

26
Q

Session Layer

A

Keeps information exchange active

27
Q

P2P network

A

two devices share info without server

28
Q

P2P application

A

two devices both each clients and servers

29
Q

HTTP message types

A

Get ~ Client Request Data
Post + Put ~ Upload Data to Server

30
Q

SMTP

A

Sending Email Protocol

31
Q

Internet Message Access Protocol

A

retrieves emails and does not delete after retrieval.

32
Q

POP

A

retrieves emails and deletes after retrieval

33
Q

DNS

A

Converts ip to recognizable names

A ~ ipv4 address
AAAA ~ ipv6 address
NS ~ name server
MX ~ mail record

34
Q

Requesting ipv6 from DHCP Process

A

Discover
Offer
Request
Pack ~ DHCP aknowledges user will use info

DORP

35
Q

Virus + Worm + Trojan Horse Difference

A

They are types of malware

Virus = Evil File Spread
Worm = Itself Spread
Trojan Horse = User Spread

36
Q

AAA

A

Controls who has access to network, record of all activity.

37
Q

Firewalls

A

In between networks and filter traffic

38
Q

End point security

A

Making sure employees don’t leak

39
Q

DMZ

A

Outsiders can access some of internal network

40
Q

Access Attacks

A

Manipulate Device