Cisco Network Flashcards

(105 cards)

1
Q

What does a Network interface card do

A

Physically connects the end device to the network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What connection physically connects the end device to the network

A

Network interface card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What connections are specialised ports on a network that connects to individuals networks

A

Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of network lets you see which end devices are connected to intermediary devices and what media is being used

A

Logical. Topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of network topology lets you see the actual location of intermediary devices and cable installations

A

Physical topology

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is LAN

A

LAN is a small geographical area of network administered by a individual and provides bandwidth to internal end devices and intermediary devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is a wan

A

Wan is a network infrastructure that covers wide geographical area managed by service providers it connects lan to other lan networks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What is an intranet

A

An intranet is a private connection of Lans and wans that belong to an organisation it’s designed to only be accessed by the organisation’s members

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What is a extranet

A

An networks for organisation to use for providing access to suppliers and customers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Name 5 common connections for home and offices

A

-Cable
-DSL
-Cellular
-Satellite
-Dial-up Telephone

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Name 4 business internet connections

A

-Dedicated Leased Line
-Metro Ethernet
-Business DSL
-Satellite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the purpose of a fault tolerant network

A

To limit the number of affected devices during a failure it is built to allow quick recovery when a failure occurs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

How does a fault tolerant network work

A

The network depends on multiple paths and allows traffic to be split in packets that are routed over a shared network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a scalability network

A

This expands quickly to support new users and applications it does this without degrading the performance of services that are being used by users

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is quality of service

A

Controls the flow of bandwidth (bits) and if network bandwidth is exceeded and network congestion happens devices will hold the packets in memory until resources become available to transmit them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What are the primary requirements of network security

A

-Confidentiality
-integrity
-availability

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Having multiple paths to a destination is known as redundancy this is an example of what network architecture

A

Fault tolerance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Switch1> config t
% Invalid input detected at ‘^’ marker.

(Refer to the exhibit^)
An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?

A

The administrator must first enter privileged EXEC mode before issuing the command

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the four cloud types

A

-public clouds

Made for general population
-private clouds

Set up by private organisations can be expansive
-Hybrid clouds

Made up of two or more clouds can be part private and part public
-Community clouds

Follows a set level of security and privacy and regulations open for organisations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What are the 7 common security Threats

A

Viruses - contain malicious software or code running on a device

Spyware and adware- installed on device and secretly collects information about the user

Zero day attacks- Occur on the first day vulnerabilities become known

Threat actor attacks-A person attacks users devices or network resources

Denial of service attacks- Slows or crashes applications and processes on a network device

Data interception and theft-This attack captures private information from organisations network

Identity theft- steals the login credentials of a user to access private data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What are the 6 security solutions to protect network

A

Antivirus and antispyware- Help protect end devices becoming infected

Firewall Filtering- Blocks unauthorised access into and out of the network

Dedicated firewall systems- Provide more advanced firewall capabilities that can filter larger amounts of traffic

Access control lists-These further filter access and traffic forwarding based on IP addresses and applications

Intrusion prevention systems- Identify fast spreading threats such as zero day or zero hour attacks

Virtual private network (VPN)- Provide secure access into an organisation for remote workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the 6 security solutions to protect network

A

Antivirus and antispyware- Help protect end devices becoming infected

Firewall Filtering- Blocks unauthorised access into and out of the network

Dedicated firewall systems- Provide more advanced firewall capabilities that can filter larger amounts of traffic

Access control lists-These further filter access and traffic forwarding based on IP addresses and applications

Intrusion prevention systems- Identify fast spreading threats such as zero day or zero hour attacks

Virtual private network (VPN)- Provide secure access into an organisation for remote workers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is an ISP

A

It is an internet service provider that is any company that provides individuals and organisations access to the internet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Which term refers to a network that provided access to the corporate offices by suppliers customers etc.

A

Extranet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
In which scenario would the use of wisp be recommended
In areas with low density WiFi or cable access is not available
26
Which device performs the function of determining the path that messages should take through the internetworks
A router
27
What does the shell and kernel part of the operating system do
Shell- The user interface that allows users to request specific tasks from computers Kernel- Communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements
28
Which access method would be most appropriate if you were in the equipment room with a new switch that needs to be configured
Console Port since the switch does not have any initial configurations
29
Which access method would be most appropriate if your manager gave you a special cable and told you to use it to configure the switch
Console
30
Which access method would be the most appropriate if you call your manager to tell him you cannot access your router in another city over the internet and he provides you with the information to access the router through telephone connection
Aux
31
Which access method would be the most appropriate in-band access to the IOS over a network connection
Telnet/SSH
32
Definition of console port
This is a physical management port that provides out of band access to Cisco devices. The advantage of using a console port is that the device is accessible even if no networking services are configured
33
Definition for Secure Shell (SSH)
This is an in-band and recommend method for remotely establishing a secure CLI connection, through a virtual interface over a network. Unlike console connection SSH connection requires active networking services on the device.
34
Definition for Telnet
Telnet is an insecure in-band method of remotely establishing a CLI session through a virtual interface over a network unlike SSH telnet does not provide a secure encrypted connection and should only be used in an lab environment
35
Is Aux used through telephone connection true or false?
True
36
What is the User EXEC mode in command modes
This mode is useful for basic operations it allows only a limited number of basic monitoring commands but does not allow the execution of any commands that might change the configuration of the device
37
How is the user EXEC mode identified on CLI
CLI prompt will end with the > symbol
38
What is the privileged EXEC Mode
This executes configuration commands, a network administrator must access privileged EXEC mode. Higher configuration modes like global configuration mode can only be reached from privileged EXEC mode
39
How can the Privileged EXEC mode be identified on the CLI command
# Symbol
40
Which IOS mode allows access to all commands and feature
Privileged Exec Mode
41
Which IOS mode are you in if Switch> prompt is displayed
User EXEC Mode
42
What Two command prompts would return you to the privileged EXEC prompt regardless of the configuration mode you are in
CTRL+Z
43
Which IOS mode are you in if the Switch(config)# prompt is displayed
Global Configuration mode
44
What type of interface has no physical port associated with it
Switch Virtual Interface (SVI)
45
What is the structure of an IPv4
Dotted-decimal format
46
How are IPV4 addresses written
They are written as four groups of decimal numbers separated by periods for example 192.168.1.1
47
Which type of access is secured on Cisco router or switch with the enable secret command
Privileged EXEC
48
What is the default SVI on a Cisco switch
VLAN99
49
When a hostname is configured through the Cisco CLI which three naming conventions are part of the guidelines
-The host name show be fewer than 64 characters in length -The hostname should contain no spaces -The hostname should begin with a letter
50
What is the function of the Shell in OS
It Interfaces between the users and the kernel
51
A router with a valid operating system contains a configuration file stored in NVRAM. The configuration file has an enable secret password but no console password. When the router boots up, which mode will display
USER EXEC MODE
52
An Administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device
Copy the running configuration to the startup configuration file
53
Which memory location on a CISCO router will lose all content when the device is restarted
RAM
54
Why would a technician enter the command, Copy startup-config running-config
To save an active configuration to NVRAM
55
What Functionality is provided by DHCP
Automatic assignment of an IP address to each host
56
Which memory location on a CISCO router or switch stores the startup configuration file
NVRAM
57
To what subnet does the IP address 10.1.100.50 belong if a subnet mask of 255.255.0.0 is used
10.1.0.0
58
What network protocols are required to successfully deliver a message
Message encoding Message formatting and encapsulation Message size Message timing Message delivery option
59
Message timing is a requirement of network protocols what are the 3 parts of message timing and explain them
Flow control -Defines how much information can be sent and the speed of which it can be delivered Response Timeout-This specifys how long to wait for a response and what action to take if response timesout Access Method- This determines when a user can send a message
60
Which delivery method is used to transmit information to one or more end devices but not all devices on the network
Multi cast
61
Which step of the communication process is concerned with properly identifying the address of the sender and receiver
Formatting
62
What is the process of converting information into the proper form for transmission
Encoding
63
What is the network security protocols
This secures data to provide authentication such as data encryption. Examples of secure protocols are Secure Shell (SSH) Secure Sockets Layer (SSL) and Transport Layer Security (TLS)
64
Definition routing protocols
Protocols enable routers to exchange route information and compares path information this selects the best path to the destination network examples of this are Open Shortest Path First (OSPF) And Border Gateway Protocol (BGP)
65
What is Service Discovery Protocols
This is used for the detection of devices or services examples of this are Dynamic Host Configuration Protocol (DHCP) this discovers services for IP address and also Domain Name System (DNS) which is used to perform name-to-IP address translation
66
What is the Network communications Protocols
This enables device's to communicate over one or more networks the examples of this are (TCP) and (HTTP)
67
BGP and OSPF are examples of which type of Network protocol
Routing
68
What is the purpose of the sequencing function in the network communication
To uniquely label transmitted segments of data for proper reassembly by the receiver
69
Which two network protocols are service discovery protocols
DNS DHCP
70
What Network protocol is reasonable for guaranteeing the reliable delivery of information
TCP
71
At which OSI layer is a source IP address added to a PDU during the encapsulation process
Network Layer
72
At which OSI layer is a source IP address added to a PDU during the encapsulation process
Network Layer
73
Why would a layer 2 switch need and IP address
To enable the switch to be managed remotely
74
What process involves placing one PDU inside another PDU
Encapsulation
75
What method can be used by two computers to ensure that packets are not dropped because too much data is being sent to quickly
Flow control
76
Which name is assigned to the transport layer PDU
Segment
77
Which three application layer protocols are part of the TCP/IP protocol suite
DHCP. DNS. FTP
78
What is the advantage of networking devices using open standard protocols
A client host and a server running different operating systems can successfully exchange data
79
Which method allows a computer to react accordingly when it requests data from a server and the server takes to long to respond
Response timeout
80
What LAYER is responsible for routing messages through an internetwork in the TCP/IP model
Internet
81
At which layer of the OSI model would a logical address be added during encapsulation
Network layer
82
What function does pressing the Tab key have when entering a command in IOS
It completes the remainder of a partially typed word in a command
83
Which Interface allows remote management of a layer 2 switch
The switch virtual interface
84
What are two characteristics of RAM on a Cisco device
1.The configuration that is actively running on the device is stored in RAM 2.The contents of RAM are lost during a power cycle
85
What command is used to verify the condition of the switch interfaces, including the status of the interfaces and a configured IP address
Show IP interface brief
86
Give a description of ISO
ISO are the largest developer of international standards in the word for a wide variety of products and services it is known for its open system Interconnection (OSI)
87
Description of ISOC
This organisation promotes the open development and the use of the internet throughout the world
88
Which organisation is responsible for overseeing and managing IP address allocation domain name management, and protocol identifiers
IANA
89
True or false. The physical layer is only concerned with wired network connections
False
90
True or False. When a frame is encoded by the physical layer, all bits are sent over the media at the same time
False
91
The physical layer of the receiving device passed bits up to which higher level layer
Data link
92
What PDU is received by the physical layer for encoding and transmission
Frame
93
What is latency
This refers to the amount of time, including delays for data to travel from one point to another
94
What is throughput
Throughput is the measure of the transfer of bits across the media over a given period of time
95
What is Goodput
Goodput is the measurement of useable data transferred over a given period of time
96
Which media uses patterns of microwaves to represent bits
Wireless
97
Which media uses patterns of light to represent bits
Fiver-Optic
98
Which media uses electrical pulses to represent bits
Copper
99
What is the name for the capacity of a medium to carry data
Bandwidth
100
What is the name for the measure of bits across the media
Throughput
101
What is a MAC address
This is a unique identifier assigned to a network interface controller, used for communications within a network segment
102
What does MAC address stand for
Media Access control Address
103
What does MAC address stand for
Media Access control Address
104
How is the MAC address represented
12-digit hexadecimal number
105
What do the first 6 digits of a MAC identify
The manufacturer of the device