Ethernet Fundamentals Flashcards

1
Q

What type of cable does Ethernet use?

A

Twisted pair cables

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What type of cable is 10BASE-T?

A

Unshielded twisted pair

Cat 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the maximum speed and distance of 10BASE-T cable?

A

Maximum speed: 10 Mbps

Maximum distance: 100 metres

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What type of device access?

  • Very organized and orderly
  • Need an electronic token to transmit
  • Example: Token Ring networks
A

Deterministic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What type of device access?

  • Very chaotic
  • Transmit (almost) whenever you want
  • Example: Ethernet networks
A

Contention-based

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What type of transmission do Ethernet devices use?

A

Carrier Sense Multiple Access/Collision Detect (CSMA/CD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Carrier sense multiple access/collision detect (CSMA/CD) is used by which type of devices?

A

Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The following describes which type of tranmission?
- Listen to the wire, verify if it is not busy
- All devices have access at any time
- If two devices transmit at the same time, a collision occurs
> Back off, wait a random time, try again

A

Carrier Sense Multiple Access/Collision Detect (CSMA/CD)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q
  • Comprised of all devices on a shared Ethernet segment (everything on the same cable or hub)
  • Devices operate at half-duplex when connected to a hub (Layer 1 device)
  • Devices must listen before they transmit to avoid collisions when operating as CSMA/CD
A

Collision domains

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
  • Ethernet switches increase scalability of the network by creating multiple collision domains
  • Each port on a switch is a collision domain, no chance of collisions, and increases speed
  • Switches can operate in full duplex mode
A

Collision domains with switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  • The measure of how many bits the network can transmit in 1-second (bps)
  • Capacity is determined by the type of cable
A

Bandwidth

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What is the bandwidth capacity of Ethernet?

A

10 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What is the bandwidth capacity of Fast Ethernet?

A

100 Mbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is the bandwidth capacity of Gigabit Ethernet?

A

1000 Mbps (1 Gbps)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

What is the bandwidth capacity of 10-Gigabit Ethernet?

A

10 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the bandwidth capacity of 100-Gigabit Ethernet?

A

100 Gbps

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

What is the media type, bandwidth capacity, and distance limitation of 10BASE-T?

A

Media type: Cat 3 or higher
Bandwidth capacity: 10 Mbps
Distance limitation: 100 m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the media type, bandwidth capacity, and distance limitation of 100BASE-TX?

A

Media type: Cat 5 or higher
Bandwidth capacity: 100 Mbps
Distance limitation: 100 m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What is the media type, bandwidth capacity, and distance limitation of 1000BASE-TX?

A

Media type: Cat 6 or higher
Bandwidth capacity: 1 Gbps
Distance limitation: 100 m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What is the media type, bandwidth capacity, and distance limitation of 1000BASE-SX?

A

Media type: MMF
Bandwidth capacity: 1 Gbps
Distance limitation: 220 m

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What is the media type, bandwidth capacity, and distance limitation of 1000BASE-LX?

A

Media type: MMF, SMF
Bandwidth capacity: 1 Gbps
Distance limitation: MMF - 550m; SMF - 5km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is the media type, bandwidth capacity, and distance limitation of 1000BASE-ZX?

A

Media type: SMF
Bandwidth capacity: 1 Gbps
Distance limitation: 70 km

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What are the primary devices used in networks?

A

Routers, switches

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q
  • Layer 1 device used to connect multiple network devices/workstations
  • Known as multiport repeaters
  • Three basic types: passive, active, smart
A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What type of hub repeats signal with no amplication?
Passive
26
What type of hub repeats signal with amplification?
Active hub
27
What type of hub is an active hub with enhanced features like SNMP?
Smart hub
28
- Hubs (layer 1) were used to connect multiple network segments together - Each LAN segment becomes a separate _______
Collision domain
29
- Analyzes source MAC address in frames entering the bridge and populate an internal MAC address table - Makes intelligent forwarding decisions based on destination MAC address in the frames
Bridge
30
- Layer 2 device used to connect multiple network segments together - Essential a multiport bridge - Learns MAC addresses and make forwarding decisions based on them - Analyzes source MAC addresses in frames entering - Populates an internal MAC address table based on them
Switch
31
- Each port represents an individual collision domain | - All ports belong to the same broadcast domain
Layer 2 switch
32
- Layer 1 device used to connect multiple network devices/workstations - Known as hubs - Three basic types: passive, active, smart
Multiport repeater
33
- Layer 3 device used to connect multiple networks together - Makes forwarding decisions based on logical network address information > Such as using IP addresses (IPv4 or IPv6) - Typically more feature rich and support a broader range of interface types than multilayer switches - Each port is a separate collision domain - Each port is a separate broadcast domain
Router
34
- Layer 3 device used to connect multiple network segments together - Can make Layer 3 routing decisions and interconnect entire networks (like a router), not just network segments (like a switch)
Layer 3 switch
35
How many possible collision domains, broadcast domains, and which layer of the OSI for hubs?
Possible collision domains: 1 Possible broadcast domains: 1 OSI Layer: 1
36
How many possible collision domains, broadcast domains, and which layer of the OSI for bridges?
Possible collision domains: 1 per port Possible broadcast domains: 1 OSI Layer: 2
37
How many possible collision domains, broadcast domains, and which layer of the OSI for switches?
Possible collision domains: 1 per port Possible broadcast domains: 1 OSI Layer: 2
38
How many possible collision domains, broadcast domains, and which layer of the OSI for multilayer switches?
Possible collision domains: 1 per port Possible broadcast domains: 1 per port OSI Layer: 3+
39
How many possible collision domains, broadcast domains, and which layer of the OSI for routers?
Possible collision domains: 1 per port Possible broadcast domains: 1 per port OSI Layer: 3+
40
The following are features of what? - Features to enhance network performance, redundancy, security, management, flexibility, scalability - Common switch features - VLANs - Trunking - Spanning Tree Protocol (STP) - Link aggregation - Power over Ethernet - Port monitoring - User authentication
Ethernet Switch features
41
What is 802.3ad?
Link aggregation
42
What is the standard for link aggregation?
802.3ad
43
Congestion can occur when ports all operate at the same speed. This allows for: - Combination of multiple physical connections into a single logical connection - Bandwidth available is increased and the congestion is minimized or prevented
Link aggregation
44
What is 802.3af?
Power over Ethernet
45
What is the standard for Power over Ethernet?
802.3af
46
What is 802.3at?
Power over Ethernet+
47
What is the standard for Power over Ethernet+?
802.3at
48
- Supplies electrical power over Ethernet > Requires CAT 5 or higher copper cable > Provides up to 15.4 watts of power to device - Two device types: > Power Sourcing Equipment (PSE) > Powered Device (PD)
Power over Ethernet
49
Supplies electrical power over Ethernet up to 25.5 W
Power over Ethernet+
50
What are the two types of devices with Power over Ethernet?
- Power Sourcing Equipment (PSE) | - Powered Device
51
- Helpful to analyze packet flows over network > Connect a network sniffer to a hub and it sees all > Switches require ________ for network analyzer to see all the traffic
Port monitoring
52
Makes a copy of all traffic destined for a port and sends it to another port
Port mirroring
53
What is 802.1x?
User authentication
54
What is the standard for user authentication?
802.1x
55
- For security purposes, switches can require ________ before providing access to the network - Once this is done, a key is generated and shared between the supplicant (device wanting access) and the switch (authenticator) - Server checks the supplicants credentials and creates the key - Key is used to encrypt the traffic coming from and being sent to the client
User authentication
56
What are the two options to configure and manage switches?
SSH and console port
57
Remote administration program that allows you to connect to the switch over the network
SSH
58
Allows for local administration of the switch using a separate laptop and a rollover cable (DB-9 to RJ-45)
Console port
59
- Involves keeping all network configuration devices on a separate network
Out-of-band (OOB)
60
SSH and console port are two options to _____ and ______ switches
Configure and manage
61
- One type of first-hop redundancy protocol - Uses virtual IP and MAC addresses to provide an "active router" and a "standby router" > Cisco-proprietary protocol > If Active if offline, then standby answers
Hot Standby Router Protocol (HSRP)
62
The following are example of what type of protocols? - Hot Standby Router Protocol (HSRP) > Uses virtual IP and MAC addresses to provide an "active router" and a "standby router" > Cisco-proprietary protocol > If Active if offline, then standby answers - Gateway Load Balancing Protocol (GLBP) > Cisco-proprietary protocol - Virtual Router Redundancy Protocol (VRRP) > Open-source protocol - Common Address Redundancy Protocol (CARP) > Open-source protocol
First-Hop Redundancy protocols
63
What are the two Cisco-proprietary first-hop redundancy protocols?
Hot Standby Router Protocol (HSRP) | Gateway Load Balancing Protocol (GLBP)
64
What are the two open-source first-hop redundancy protocols?
Virtual Router Redundancy Protocol (VRRP) | Common Address Redundancy Protocol (CARP)
65
Permits or denies traffic based on a device's MAC address to improve security
MAC filtering
66
Multilayer switches may permit or deny traffic based on IP addresses or application ports
Traffic filtering
67
What is 802.1D?
Spanning Tree Protocol (STP)
68
What is the standard for Spanning Tree Protocol (STP)?
802.1D
69
- Permits redundant links between switches and prevents looping of network traffic - Availability is measured in 9s > Five 9s is 99.999% uptime > Only 5 minutes down per year is allowed - Without it, MAC address table corruption can occur - Shortest Path Bridging (SPB) is used instead of _______ for larger network environments
Spanning Tree Protocol (STP)
70
- Used instead of STP for larger network environments
Shortest Path Bridging (SPB)
71
- If broadcast frame received by both switches, they can forward frame to each other - Multiple copies of frame are forwarded, replicated, and forwarded again until the network is consumed with forwarding many copies of the same initial frame
Broadcast storm
72
- Switch elected to act as a reference point for a spanning tree - Switch with the lowest bridge ID (BID) is elected as the ______ - BID is made up of a priority value and a MAC address (with the lowest value considered root) - All ports are designated
Root bridge
73
- All other switches in an STP topology that are not a root bridge - Single root port - All other ports are non-designated
Non-root bridge
74
- Every non-root bridge has a single ________ - Port closest to the root bridge in terms of cost - If costs are equal, lowest port number is chosen
Root port
75
- Every network segment has a _________ - Port closest to the root bridge in terms of cost - All ports on root bridge are ________
Designated port
76
- Ports that block traffic to create loop-free topology - Do not forward traffic during normal operation, but do receive bridge protocol data units (BPDUs) - If a link in the topology goes down, the ______ detects the failure and determines whether it needs to transition to a forwarding state
Non-designated port
77
- Blocking - Listening - Learning - Forwarding
Port states
78
- Received by non-designated ports, which do not forward traffic during normal operation
Bridge protocol data units (BPDUs)
79
To get to the forwarding state, the non-designated port has to transition through _____ states (in total, including forwarding). What are they?
Four states: blocking, listening, learning, forwarding
80
Which port state? - BPDUs are received but they are not forwarded - Used at beginning and on redundant links - Root and non-designated ports
Blocking
81
Which port state? - Populates MAC address table - Does not forward frames
Listening
82
Which port state? - Processes BPDUs - Switch determines its role in the spanning tree
Learning
83
Which port state? - Forwards frames for operations - Designated ports
Forwarding
84
- Associated with the speed of a link - Lower the link speed, the higher the ______ - Long STP is being adopted due to higher linker speeds over 10 Gbps - Values range from 2 million for 10-Mbps Ethernet to as little as 2 for 10 Tbps
Link costs
85
- Switch ports are in a single broadcast domain - Allow you to break out certain ports to be in different broadcast domains - Before: > You had to use routers to separate departments, functions, or subnets > Different switches were required for separation - Allow different logical networks to share the same physical hardware - Same switches, but switch ports can be different - Provides added security and efficiency
Virtual Local Area Network (VLAN)
86
What is 802.1q?
VLAN Trunking
87
What is the standard for VLAN Trunking?
802.1q
88
- Multiple VLANs transmitted over the same physical cable - VLANs are each tagged with 4-byte identifier > Tag Protocol Identifier (TPI) > Tag Control Identifier (TCI) - One VLAN is left untagged > Native VLAN
VLAN Trunking (802.1q)
89
What are the two 4-byte identifiers that VLANs are tagged with in VLAN trunking?
- Tag Protocol Identifier (TPI) | - Tag Control Identifier (TCI)
90
What is the one untagged VLAN called in VLAN trunking?
Native VLAN
91
The following are examples of what? - VPN concentrators - Firewalls - DNS servers - DHCP servers - Proxy servers - Content engines and switches They serve specific functions to improve usability, performance, and security
Specialized network devices
92
What are some examples of specialized network devices?
- VPN concentrators - Firewalls - DNS servers - DHCP servers - Proxy servers - Content engines and switches
93
Creates a secure, virtual tunnel network over an untrusted network like the Internet
Virtual private network (VPN)
94
One of the devices that can terminate VPN tunnels (although firewalls can also perform this function)
VPN concentrator
95
- Network security appliance at your boundary | - Can be software or hardware
Firewalls
96
_____ firewalls: - allow traffic that originates from inside the network and go out to the internet - block traffic originating from the internet from getting into the network
Stateful firewalls
97
- Conducts deep packet inspection at layer 7 - Detects and prevents attacks - Much more powerful than basic stateless and stateful firewalls - Continually connects to cloud resources for latest information on threats
Next Generation Firewall (NGFW)
98
At what layer does deep packet inspection occur
Layer 7
99
- Recognizes attacks through signatures and anomalies | - Host or network-based device
Intrusion detection systems (IDS)
100
- Recognizes and responds to attacks | - Host or network-based devices
Intrusion prevention systems (IPS)
101
- Converts domain names to IP addresses | - Similar to the contact list in a phone
Domain Name System (DNS)
102
- Domain name under a Top-Level Domain and represents a web, mail, or file server
Fully-Qualified Domain Name (FQDN)
103
- Contains the FQDN with method of accessing information
Uniform Resource Locator (URL)
104
Which DNS Record type? | - Address record maps hostname to IPv4 address
A
105
Which DNS Record type? | - Address record maps hostname to IPv6 address
AAAA
106
Which DNS Record type? | - Alias for existing record, e.g. diontraining[.]com = www[.]diontraining[.]com
CNAME (canonical name)
107
Which DNS Record type? | - Maps domain name to email server
MX (mail exchange)
108
Which DNS Record type? | - Denotes the authoritative name server for the domain
NS
109
Which DNS Record type? - Refers to the canonical name - Used for reverse DNS lookups
PTR (pointer record)
110
Which DNS Record type? | - Provides authoritative information about DNS zone: contact information, primary name server, refresh times
SOA (start of authority)
111
Which DNS Record type? - Generalized service location record; newer protocol that doesn't require specific protocols records like MX, CNAME, etc.
SRV
112
Which DNS Record type? - Designed to hold human readable code originally - Used now to hold machine readable data like DomainKeys Identified Email (DKIM), Sender Policy Framework (SPF), and opportunistic encryption
TXT
113
- Initially, clients on networks needed IP addresses manually configured (or statically assigned) to communicate > Can lead to configuration errors > Can become a hassle for large networks - Automates process so the majority of devices on a network automatically receive: > IP address > Subnet mask > Default gateway > DNS server addresses
Dynamic Host Configuration Protocol (DHCP)
114
What are the DHCP steps?
1. DHCP DISCOVER 2. DHCP OFFER 3. DHCP REQUEST 4. DHCP ACK D.O.R.A
115
- Device that makes a request to external network on behalf of a client - Used for security to perform content filtering and logging - Workstation clients are configured to forward their packets to a ________
Proxy server
116
- Dedicated appliances that perform the caching functions of a proxy server - Are more efficient than a proxy server - Also called caching engines
Content engine
117
- Dedicated appliances that perform the caching functions of a proxy server - Are more efficient than a proxy server - Also called content engines
Caching engine
118
- Distributes incoming requests across the various servers in the server farm - Also known as load balancers
Content switches
119
- Distributes incoming requests across the various servers in the server farm - Also known as content switches
Load balancers