Exam One Study Guide (Ch. 1 - 3) Flashcards

(102 cards)

1
Q

What are the four basic elements of a network?

A

switches, routers, wireless access points, and the network itself

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What are three elements of communication?

A

sender, receiver, and message

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is a LAN or WAN? How are they different? Characteristics?

A

An LAN is a network infrastructures that provides access to users and end devices in a small geographic area. A WAN is a network infrastructure that provides access to other networks over a wide geographic area.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Internet vs. Extranet vs. Intranet

A

The internet is a global network that connects millions of devices and computers worldwide. The intranet is a private network that is only accessible to authorized users within an organization. The extranet is a private network that allows external parties to access certain parts of an organization’s intranet.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What are the different types of home and small office internet connections/what are their purpose?

A

Cable: high bandwidth, always on, internet offered by cable television service providers.
DSL: high bandwidth, always on, internet connection that runs over a telephone line.
Cellular: uses a cell phone network to connect to the internet.
Satellite: major benefit to rural areas without Internet Service Providers.
Dial-up Telephone: an inexpensive, low bandwidth option using a modem.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a converged network?

A

carries multiple services on one network including data, voice, and video

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What are the types of business internet connections?

A

Dedicated leased line: These are reserved circuits within the service provider’s network that connect distant offices with private voice and/or data networking.
Ethernet WAN: This extends LAN access technology into the WAN.
DSL: Business DSL is available in various formats including Symmetric Digital Subscriber Lines (SDSL).
Satellite: This can provide a connection when a wired solution is not available.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are the four basic characteristics network admins must address at all times to meet user expectations and what does each represent?

A

Fault tolerance, Scalability, Quality of Service (QoS), and Security

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The three primary requirements of network security and what they mean

A

Confidentiality: protecting sensitive information from unauthorized access, ensuring only those with proper credentials can view it.
Integrity: guaranteeing that data is not tampered with during transmission or storage, and that any changes are made by authoroized users only,
Availability: Ensuring that critical systems and data are accessible to authorized users whenever needed, without interuption.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Recent trends in networking and home technology

A

Bring your own device (BYOD)
Online Collaboration
Video Communications
Cloud Computing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the types of ‘clouds’ (four)

A

Public Clouds: available to the general publci through a pay-per-use model for a fee
Private Clouds: intended for a specific organization or entity such as the government
Hybrid Clouds: made up of two or more Cloud types - for example, part custom and part public. Each part remains a distinctive object but both are connected using the same architecture.
Custom Clouds: built to meet the needs of a specfic industry, such as healthcare or media. Can be private or public.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What are the different types of security threats and what solutions are available for security professionals?

A

Viruses, worms, and Trojan horses: These contain malicious software or code running on a user device.
Spyware and adware: These types of software are installed on a user’s device to secretly collect information about the user.
Zero-day attacks: Also called zero-hour attacks, these occur on the first day that a vulnerability becomes known.
Threat actor attacks: In these attacks, malicious persons attack user devices or network resources.
Denial-of-Service attacks: These attacks slow or crash applciations and processes on a network device.
Data Interception and theft: This type of attack involves capturing private information from an organization’s network.
Identity theft: This type of attack involves stealing the login credentials of a user in order to access private data.
Solutions: antivirus and antispyware, firewall filtering, dedicated firewall systems, access control lists (ACL), intrusion prevention systems (IPS), Virtual Private Network (VPN)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

What are the three components of an operation system and what do they do?

A

Shell: The user interface that allows users to request specific tasks from the computer. These requests can be made through either the CLI or GUI.
Kernel: the kernel communicates between the hardware and software of a computer and manages how hardware resources are used to meet software requirements.
Hardware: the physical part of a computer, including underlying electronics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is a GUI?

A

Graphic User Interface: allows the user to interact with the system using an environement of graphical icons, menus, and windows

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Why do most users rely on a GUI environment?

A

More user-friendly and requires less knowledge of the underlying command structure that controls the system.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

What is the purpose of a CLI?

A

Allows the users to interact with a network device directly by typing text commands to configure settings and manage security features on a cisco device

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Name at least one advantage and disadvantage of a CLI interface?

A

This type of interface needs much less memory (RAM) in order to use compared to other types of user interfaces. However, commands have to be typed precisely. If there is a spelling error the command will fail.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

When would you have to use the console port rather than Telnet?

A

when you need to access a device directly, even if the device isn’t connected to its primary network.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Why is SSH not used instead of telnet all the time?

A

SSH protects user identities, passwords, and data from network snooping attacks, and allows secure logins and file transfers.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What are the main Cisco iOS modes (describe…i.e. privileged exec, etc…), and which do you enter first when you access the CLI?

A

User EXEC: log in (Router>)
Priviledged EXEC: use the enable exec command (Router#)
Global Configuration: use the configure terminal command (Router(config)#)
Interface Configuration: use the interface command (Router (config-if)#)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

What are the three methods of accessing the Cisco IOS command line interface?

A

Console: access the CLI by connecting directly to the console port.
Telnet: access the CLI remotely using a telnet session.
SSH: access the CLI remotely during a SSH session.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

You know that there is a show (help) command that will show you the contents of the routing table, but you cannot remember which show command it is. What should you do?

A

“show IP route” or “show running-config”

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What do network operating systems enable users to do through a GUI?

A

interact with the system using an environment of graphical icons, menus, and windows.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which access method needs a physical connection in order to access network components?

A

Ethernet: ethernet is a networking standard that uses physical cables like twisted pair to connect devices on a network, meaning a direct wired connection is necessary to access network componenets using this method.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
What programs are used to connect to network devices and allow for enhancing productivity or changing fonts?
Terminal emulation programs such as PuTTY, Tera Term, and SecureCRT
22
What are three popular terminal emulation programs?
PuTTY, Tera Term, and SecureCRT
23
What are the two primary command modes for management access in network components?
User Exec Mode & Priviledged Exec Mode
24
How do you know which iOS mode you are working in (symbols, (config), etc…)?
Router(config)#: Global configuration mode Router(config-if)#: Interface configuration mode Router#: Privileged EXEC mode Router>: User EXEC mode
25
What is the prompt in privileged exec mode if the router’s name is Athens? (prompts are what you see before the command…look at the diagram in the text/slides about command lines syntax)
Athens#
26
What command would you enter in order to go to global configuration mode?
configure terminal
26
What is the prompt in global configuration mode if the router’s name is Athens?
Athens(config)#
27
What command exits the current configuration mode and returns to the pervious configuration mode?
the exit command
28
What command exits the current configuration mode and returns to EXEC mode?
the end command
28
What are the two most common sub-configuration modes and for what purpose are they used?
Interface sub-configuration mode & VLAN sub-configuration mode
29
What components make up the command structure syntax?
Prompt Command Space Keyword or Argument (ex. switch>ping 192.168.10.5)
30
Why should each router and switch have a unique descriptive hostname?
A unique hostname makes it easier to identify and manage each router and switch within a network.
31
What are the important guidelines for naming routers and switches?
-start with a letter -contain no spaces -end with a letter or digit -use only letters, digits, and dashes -be less than 64 characters in length
31
What characterizes and determines strong passwords?
-more than eight digits in length -upper and lower case -variety -avoid common words
32
Describe a IPv4 subnet mask.
a 32-bit number created by setting host bits to all 0s and setting network bits to all 1s.
32
How would I check to determine if a password is encrypted in IOS?
check the digit before the encrypted string in the configuration file
33
What are examples of end devices?
computers, smartphones, tablets, printers, scanners, etc
34
How are IPv4 address represented?
four decimal numbers between 0-255 (ex. 192.0.2.146)
34
A dotted-decimal notation indicates what type of address?
IPv4
35
The IP address of the router that hosts (end devices) will use to access remote networks is called?
default gateway
35
Coupled with IPv4 addressing, subnet mask determines what?
the network portion and host portion of an IP address
36
How are IPv6 address represented?
eight groups of 16-bit hexadecimal numbers, seperated by colons. (ex. 2001:db8:1234::f350:2256:f3dd/64)
36
What is an IPv6 address and how is it different than IPv4 addresses?
IPv4 is a 32 bit address, whereas IPv6 is a 128-bit hexadecimal address.
37
Are IPv6 addresses case sensitive?
not case-sensitive and can be written in either lowercase or uppercase
38
On what are network communications dependent?
Timing determines how fast bits are transmitted, when hosts can send data, and how much data can be sent at once.
39
What are the differences between various types of media?
Physical composition, transmission method (electrical signals, light pulses), bandwidth capabilties, distance in limitations, and susceptibility to interference.
40
What is the most common type LAN tehconology used today?
Ethernet is widely used for both wired and wireless networks, and is considered the standard LAN.
41
What do protocols define?
a set of rules or a process or procedure of how to proceed or act
41
What are the three elements of communication?
message source destination transmission medium
42
Rules that are specific to the type of communication method being used are called?
protocols
43
What are the four requirements to successfully deliver a message that is understood by the receiver?
an identified sender and receiver, a common language and grammar, speed and timing of delivery, and confirmation or acknowledgment requirements
43
Be able to give or identify examples of organizations that standardize networking protocols.
Electronic Industries Alliance (EIA) or Institute of Electrical and Electronic Engineers (IEEE)
44
Be able to give or identify several benefits of using layered models
Assist in protocol design because protocols that operate at a specific layer have defined information that they act upon and a defined interface to the layers above and below Foster competition because products from different vendors can work together Prevent technology or capability changes in one layer from affecting other layers above and below Provide a common language to describe networking functions and capabilities
45
Define and understand the common computer protocols surrounding network protocol requirements (3.1.6-3.1.10)***
Network Communications: enable two or more devices to communicate over one or more networks (TCP, HTTP, SMTP, etc..) Network Security: secure data to provide authentication, data integrity, and data encryption (SSH, SSL, TLS) Routing: enable routers to exchange route information, compare path information, and select best path (OSPF, BGP) Service Discovery: used for the automatic detection of devices or services (DHCP, DNS)
46
Sending a message over computer network typically requires several protocols, each with their own function, which is called what?
Protocol Suite
47
What is a protocol suite?
A group of inter-related protocols necessary to perform a communication function Sets of rules that work together to help solve a problem
48
What concerns do lower and higher layers of protocol stacks give to moving data across the network? How do they differ?
Lower layers primarily focus on the physical transmission of data, ensuring bits are correctly sent across the network, while higher layers are concerned with application-specfic details like data integrity, sequencing, and error handling.
49
What are/were the four competing protocol suites?
Internet Protocol Suite or TCP/IP: The most common protocol suite and maintained by the Internet Engineering Task Force (IETF) Open Systems Interconnection (OSI) protocols: Developed by the International Organization for Standardization (ISO) and the International Telecommunications Union (ITU) AppleTalk: Proprietary suite release by Apple Inc. (no longer used) Novell NetWare: Proprietary suite developed by Novell Inc. (no longer used)
50
Which are the main protocol suites in use today?
TCP/IP
51
What are the characteristics of standards organizations?
-vendor-neutral -non-profit organization -established to develop and promote the concept of open standards -Internet Society (ISOC) - Promotes the open development and evolution of internet -Internet Architecture Board (IAB) - Responsible for management and development of internet standards -Internet Engineering Task Force (IETF) - Develops, updates, and maintains internet and TCP/IP technologies -Internet Research Task Force (IRTF) - Focused on long-term research related to internet and TCP/IP protocols
51
Be familiar with protocol association with TCP/IP only (pp.101-103).
-Address resolution protocol (ARP) -Internet control message protocol (ICMP) -Reverse address resolution protocol (RARP) -User Datagram Protocol (UDP)
52
IP information added to the front of the TCP information which includes source and destination IP addresses in known as an ____________? (IP Packet) found in step 4 (you would not need to know the step number)
IP Header
53
What protocol adds information to both ends of an IP Packet known as a data link frame?
The ethernet protocol
54
If given a diagram of Protocol Encapsulation, you should be able to identify the terms associated with the diagram (i.e. the figures such as 3-16 p. 105)
54
A __________ is a collection of media and intermediary devices?
network
55
Why are standards and protocols important?
help ensure the integrity of connections and connected resources
55
What are the 4 organizations involved with the development and support of the internet?
-W3C (Word Wide Web Consortium) -ISO (International Organization for Standardization) -IETF (Internet Engineering Task Force) -NASA (National Aeronautics and Space Organzation)
56
What are the 2 organizations involved with the development and support of the TCP/IP?
-The Defense Advanced Research Projects Agency (DARPA) -Internet Engineerying Task Force (IETF)
57
What is meant by the term ‘proprietary’?
proprietary to Cisco Systems and therefore not supported by other vendors.
57
What encourages the interoperability, competition, and innovation of network components?
58
What are the 4 organizations associated with electronic and communications standards?`
-Internet Society (ISOC): Promotes the open development and evolution of internet -Internet Architecture Board (IAB): Responsible for management and development of internet standards -Internet Engineering Task Force (IETF): Develops, updates, and maintains internet and TCP/IP technologies -Internet Research Task Force (IRTF): Focused on long-term research related to internet and TCP/IP protocols
59
What is a reference model and what is its purpose?
a conceptual framework that provides a standardized, high-level description of the key components and relationships within a specific system or domain, acting as a common reference point for understanding, communication, and comparison between different implementations within that domain
59
What are the two primary models used when describing networking?
OSI/ISO model and the TCP/IP model
60
What are the four layers of the TCP/IP model? What is done at each layer? Be able to name / identify the PDU (p. 119) for each layer.
1. Link or access layer 2. Internet layer 3. Transport layer 4. Application layer
60
Be able to compare and contrast the OSI model and the TCP/IP model.
OSI has seven distinct layers while TCP only has four. with the OSI model providing a more detailed breakdown of network functions and the TCP/IP model being more focused on practical implementation and widely used in real-world networks
60
What is meant by encapsulation? What is meant by decapsulation?
the process by which a device adds networking headers and trailers to data from an application for the eventual transmission of the data onto a transmission medium; decapsulation is a process by which an end device, after it receives data over some transmission medium, examines the headers and trailers at each successively higher layer and eventually hands the data to the correct application
61
Be able to list and identify the seven layers of the OSI model (Hint: All People Seem To Need Data Processing). You should know the general function of each layer and with which number each layer is associated and what the lower layers are associated with which device (layers 1, 2 & 3).
1. the physical layer 2. the data link layer 3. the network layer 4. the transport layer 5. the session layer 6. the presentation layer 7. the application layer
62
What is multiplexing?
a process in which multiple digital data streams are combined into one signal
62
What does the physical layer of the OSI model do?
responsible for the transmission of raw data bits across a physical medium
63
Define segmentation of messages / what are the advantages of segmentation?
a strategy that involves dividing a computer network into smaller parts to improve security and network performance. Improves network performance and security.
64
Why is a large message divided into pieces before it sent?
Helps avoid retransmission of the entire message if there is a problem.
65
What is sequencing and what controls the sequence order?
the process of assigning a numerical order to entries within an Access Control List (ACL), which determines the order in which packets are inspected and either permitted or denied access to a network; the sequence order is controlled by the numerical value assigned to each ACL entry, with lower numbers being evaluated first
66
What is a PDU---and no…I do not need the answer: Protocol Data Unit?
the basic unit of exchange between entities that communicate using a specified networking protocol
67
What is the PDU for Layer 2 called? Other questions similar wording….
the protocol data unit for layer two, the data link layer, is called a frame
68
What two things are needed to access a local network resource and what roles do they have?
a network adapter on your device, which allows it to connect to the network, and a valid network address (IP address) that uniquely identifies your device within that network, enabling other devices to send data to you
69
What is a NIC?
a network interface card- a hardware component that allows a computer to connect to a network and exchange data with other devices
70
What is responsible for delivering an IP packet from the original source to the final destination?
The internet protocol which operates at the network layer of the OSI model; utilizes routing mechanisms to navigate the network and forward the packet through various routers based on the destination IP address
71
What is responsible for delivering the data link frame from one NIC to another NIC on the same network?
The data link layer of the OSI model, this is achieved through the Media Access Control (MAC) sublayer which manages access to the shared transmission medium, like the ethernet cable
72
What address does a NIC encode in the data link layer?
The encoding of a MAC address on an NIC places it at that layer
72
What do we call a ‘logical’ address and with what layer is it associated?
An IP address; is associated with the Network Layer (layer three) in the OSI model
73
How can we determine if two devices are on the same network? Could you identify with an address only?
Compare their IP addresses; if the first few octets (number separated by dots) of the IP address match, then they are likely on the same network
73
What do we call a ‘physical’ address and with what layer is it associated?
the MAC address and is associated with the Data Link Layer (Layer 2) of the OSI model
74
What two parts do an IP address contain? (know and describe)
The network ID which identifies the specific network a device belongs to, and the host ID which identifies the unique device within that network
75
An IP packet contains what two IP addresses? (know and describe)
The source IP address and the destination IP address
76
What are data link addresses known as?
Media Access Control (MAC) addresses
77
NIC cards are physically embedded with what address?
MAC address
78
What are the roles of network layer (logical) and data link (physical) address on the same networks? Remote networks?
The data link layer address (physical address like a MAC) identifies a specific device within a network, while the network layer address (logical address, like an IP address) identifies a device across multiple networks, allowing data to be routed to the correct destination on a larger scale
79
What is the unique role the data link layer (layer 2) physical address plays to deliver the data link frame from one network interface to another network interface?
the data link layer provides the functional and procedural means to transfer data between network entities, the MAC address uniquely identifies a network interface on a local network, allowing the data link layer to precisely direct a data frame to the intended device within that network