ICND-1 (Cram Guide) Flashcards

1
Q

All People Seem To Need Data Processing

A
Application
Presentaion
Session
Transport
Network
Data Link
Physical
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Don’t Some People Fry Bacon

A
Data
Segments
Packets
Frames
Bits
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Provides services to lower layers. Enables program-to-program communication and determines whether sufficient resources exist for communication. Examples are e-mail gateways (SMTP), TFTP,
FTP, and SNMP.

A
  1. Application Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Presents information to the Application Layer. Compression, data conversion, encryption, and standard formatting occur here. Contains data formats JPEG, MPEG, MIDI, and TIFF.

A
  1. Presentation Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Establishes and maintains communication ‘sessions’ between applications (dialogue control). Sessions
can be simplex (one direction only), half duplex (one direction at a time), or full duplex (both ways simultaneously). Session Layer keeps different applications data separate from other applications.
Protocols include NFS, SQL, X Window, RPC, ASP, and NetBios Names.

A
  1. Session Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Responsible for end-to-end integrity of data transmissions and establishes a logical connection between sending and receiving hosts via ‘virtual circuits.’ Windowing works at this level to control how much information is transferred before acknowledgement is required.
Data is segmented and reassembled at this layer. Port numbers are used to keep track of different conversations crossing the network at the same time. Supports TCP, UDP, SPX, and NBP. Segmentation works here (Segments) and error correction (not detection).

A
  1. Transport Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Routes data from one node to another and determines the best path to take. Routers operate at this level. Network addresses are used here, which are used for routing (Packets). Routing tables, subnetting, and control of network congestion occur here. Routing protocols, regardless of which protocol they run over, reside here: IP, IPX, ARP, IGRP, and Appletalk.

A
  1. Network Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Sometimes referred to as the LAN layer. Responsible for the physical transmission of data from one node to another. Error detection occurs here. Packets are translated into frames here and hardware address is added. Bridges and switches operate at this layer.

A
  1. Data Link Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Manages communications between devices over a single link on a network. Uses Service Access Points (SAPs) to help lower layers talk to the Network Layer.

A

Logical Link Control sublayer (LLC) 802.2:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Builds frames from the 1s and 0s that the Physical Layer
(address = 6 byte/48 bit) picks up from the wire as a digital signal and runs a Cyclic Redundancy Check (CRC) to assure no bits were lost or corrupted.

A

Media Access Control sublayer (MAC) 802.3:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Puts data onto the wire and takes it off. Physical Layer specifications, such as the connectors, voltage, physical data rates, and DTE/DCE interfaces. Some common implementations include Ethernet/IEEE 802.3, FastEthernet, and Token Ring/IEEE 802.5.

A
  1. Physical Layer
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Purpose is to switch traffic as quickly as possible. Fast transport to enterprise services (Internet, etc.). No packet manipulation, VLANs, access-lists. High-speed access required, such as FDDI and ATM.

A

Core Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Time-sensitive manipulation, such as routing, filtering, and WAN access. Broadcast/multicast, media translations, security.

A

Distribution Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Switches and routers; segmentation occurs here, as well as workgroup access. Static (not dynamic) routing.

A

Access Layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

TCP/IP port 20

A

File Transfer Protocol – Data (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

TCP/IP port 21

A

File Transfer Protocol – Control (TCP) (Listens on this port)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

TCP/IP port 22

A

SSH (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

TCP/IP port 23

A

Telnet (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

TCP/IP port 25

A

Simple Mail Transfer Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

TCP/IP port 53

A

Domain Name Service (TCP/UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

TCP/IP port 69

A

Trivial File Transfer Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

TCP/IP port 80

A

HTTP/WWW (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

TCP/IP port 110

A

Post Office Protocol 3 (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

TCP/IP port 119

A

Network News Transfer Protocol (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

TCP/IP port 123

A

Network Time Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

TCP/IP port 161/162

A

Simple Network Management Protocol (UDP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

TCP/IP port 443

A

HTTP over Secure Sockets Layer (HTTPS) (TCP)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Protocol 6) Reliable, sequenced, connection-oriented delivery, 20-byte header.

A

TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

(Protocol 17) Connectionless, unsequenced, best-effort delivery, 8-byte header. Sends data but does not check to see whether it is received.

A

UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Used to connect to a remote device (TCP). A password and username is required to connect. Telnet tests all seven layers of the OSI model.

A

TELNET

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Connection-orientated (TCP) protocol used to transfer large files.

A

FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Connectionless (UDP) protocol used for file transfer.

A

TFTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Allows remote management of network devices.

A

SNMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Supports packets containing error, control, and informational messages. Ping uses ICMP to test network connectivity.

A

ICMP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Used to map an IP address to a physical (MAC) address. A host wishing to obtain a physical address broadcasts an ARP request onto the TCP/IP network. The host replies with its physical address.

A

ARP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Resolves hostnames to IP addresses (not the other way around). To configure the router to use a host on the network, use the command ROUTER(config)#ip name-server 4.2.2.2, and to configure DNS, use the command ip name-server (usually already turned on for the router
configuration by default). If you want hosts on the network to use the router as a proxy DNS server, put the command Router(config)#ip dns server onto the router.

A

DNS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Involves a central server, or devices, which relays TCP information to hosts on a network. You can configure a router to be a DHCP server with the configuration below. You must have hosts on the same LAN as the router interface:

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

Router(config)#ip dhcp pool E00_DHCP_Pool
Router(dhcp-config)#network 10.10.10.0 255.255.255.0
Router(dhcp-config)#dns-server 24.196.64.39 24.196.64.40
Router(dhcp-config)#domain-name mydomain.com
Router(dhcp-config)#default-router 10.10.10.254
Router(dhcp-config)#lease 1

A

DHCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Router>

A

User EXEC:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Router#

A

Privileged EXEC:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Router(config)#

A

Global Configuration

42
Q

> or rommon>

A

ROM Monitor

43
Q

Ctrl+W

A

Erases a word

44
Q

Ctrl+U

A

Erases a line

45
Q

Ctrl+A

A

Moves cursor to beginning of line

46
Q

Ctrl+E –

A

Moves cursor to end of line

47
Q

Ctrl+F (or right arrow) –

A

Moves forward one character

48
Q

Ctrl+B (or left arrow) –

A

Moves back one character

49
Q

Ctrl+P (or up arrow) –

A

Recalls previous commands from buffer

50
Q

Ctrl+N (or down arrow) –

A

Returns to more recent commands in buffer

51
Q

Esc+B –

A

Moves back one word

52
Q

Esc+F –

A

Moves forward one word

53
Q

Tab

A

Completes a command you have started

54
Q

show version

A

Shows information about IOS in RAM and displays how much physical memory is installed. Also shows the configuration register setting

55
Q

show process

A

Shows information about programs running in DRAM.

56
Q

show running-configuration

A

Shows active configuration in DRAM

57
Q

show memory/stacks/buffers

A

Command used to view tables and buffers.

58
Q

Stores router’s startup configuration. Does not lose data when powered off due to a battery power source:

A

NVRAM

59
Q

EEPROM or PCMCIA card holds the compressed operating system image (IOS). This is where software upgrades are stored:

A

Flash

60
Q

Contains power on diagnostics, a bootstrap program, and a mini-IOS (rommon). You can specify which file the routers boots from if you have more than one in flash memory:

A

ROM

61
Q

A PC connected to the console port via a rollover cable. Used for initial configuration or disaster recovery.

A

Console port

62
Q

Normally accessed by telnetting to the router. Five lines available, numbered 0 to 4 (more lines possible, depending on the Router/Switch model).

A

Virtual terminals

63
Q

Normally a modem connected to this port.

A

Auxiliary port

64
Q

The router can get its configurations or IOS from a server (a PC, for example) running TFTP software and holding the necessary files.

A

TFTP server

65
Q

Network management station. Uses SNMP to manage the router normally via a web-style interface.

A

NMS

66
Q

it allows you to gather information about other routers and switches. It is enabled by default. It can also be a very useful command to use while troubleshooting to see which devices are directly connected to the device you are connected to.

A

Cisco Discovery Protocol (proprietary) runs only on Cisco devices

67
Q

Command to displays the neighbouring router or switch’s hostname, hardware platform, port identifier, and capabilities list:

A

Router#show cdp neighbors

68
Q

To turn off CDP on an interface,

A

Router(config-if)#no cdp enable

69
Q

To turn off CDP on your entire router or switch,

A

Router(config)#no cdp run

70
Q

A LAN switch has three primary functions:

A
  1. Address learning – Maintains a table (CAM – Content Addressable Memory) of addresses and on which port they can be reached.
  2. Forward/filter decision – Forwards frames only out of the relevant port.
  3. Loop avoidance – STP.
71
Q

The switch copies the entire frame into its buffer and computes the CRC. The
frame is discarded if there is an error. High latency.

A

Store-and-Forward

72
Q

Reads only the destination address (first 6 bytes after preamble), looks up address, and
forwards frame. Lower latency.

A

Cut-through

73
Q

The switch reads the first 64 bytes before forwarding the frame. Collisions normally
occur within the first 64 bytes.

A

Fragment-free

74
Q

command to switch default gateway

A

Switch(config)#ip default-gateway 192.168.1.1

75
Q

Switch#show mac-address-table dynamic

A

shows MAC table (dynamic)

76
Q

Switch(config-if)#switchport port-security

A

enable port security

77
Q

Switch(config-if)#switchport port-security violation shutdown

A

shutdown the port if some event occur

78
Q

Switch(config-if)#switchport port-security maximum 4

A

only 4 MACs

79
Q

Switch(config-if)#switchport port-security mac-address xxx

A

enter de mac that is allowed to use that interface

80
Q

Switch #show port-security

A

show all security config. that was setted

81
Q

Router(config)#ip route {destination network}{mask}{next hop
address}

e.g. ip route 172.16.5.2 255.255.255.0 172.16.12.8

A

Static routing

82
Q

Router(config)#router rip

Router(config-router)#version 2

Router(config-router)#network 172.16.0.0

Router(config-router)#no auto-summary (optional)

A

Dynamic addressing uses a routing protocol:

for RIP v2

83
Q

RIP v2 (facts)

A
 Uses UDP port 520
 Classless
 Max hop count is 15
 Multicasts route updates to 224.0.0.9
 Supports authentication
 Update timer, 30 seconds
 Invalid, 90 seconds
 Hold down, 180 seconds
 Flush, 270 seconds
84
Q

Protocol that understand the direction and distance to any given network connections

A

Distance Vector protocols

85
Q

Problems with Distance Vector protocols include _______ _____ and ______ to ______.

A

routing loops and

counting to infinity

86
Q

For all configurations, you must specify which interfaces are internal for NAT and which are external:

A

Router(config-if)#ip nat inside/outside

87
Q

Static NAT – Maps one address to one address, such as 192.168.1.1 to 200.1.1.1

A

outer(config)#ip nat inside source static 192.168.1.1 200.1.1.1

88
Q

Maps a number of internal addresses to a pool of external addresses

A

Dynamic NAT

89
Q

Router(config)#ip nat pool ad_team 10.0.0.1 10.0.0.10 prefix-length 24

Router(config)#ip nat inside source list 1 pool ad_team out

Router(config)#access-list 1 permit 192.168.1.0 0.0.0.255

A

The
configuration below creates a pool of 10 addresses with a mask (prefix length) of 255.255.255.0 and the name ‘ad_team.’ The hosts that will go through NAT are on the 192.168.1.0 network.

90
Q

The two methods for wireless authentication are ___ ______ and ______ _____

A

open system and shared key.

91
Q

the host sends an association request to the wireless access point and it will be sent a success or failure message

A

open-system

method (Wireless)

92
Q

a key or pass phrase is configured on both the host

and the access point

A

shared-key method (Wireless)

93
Q

There are three types of shared-key authentication

A

WEP, WPA, and WPA2

94
Q

Is an encryption algorithm built in the 802.11 standard. It uses RC4 40-bit or 104-bit keys and a 24-bit initialisation vector.

A

WEP

95
Q

uses dynamic key management, adds a stronger encryption cipher, and is built on the EAP/802.1X mechanism. It uses Temporal Key Integrity Protocol (TKIP), and the Initialization Vector is increased to 48-bit (more than 500 trillion key combinations). It is used with RADIUS in the enterprise

A

WPA

96
Q

It uses even stronger encryption than WPA and this
is achieved by using the Advanced Encryption Standard (AES). In addition, WPA2 creates a new key for every new association. This is a benefit over WPA in that the client’s keys are unique and specific to that client.

A

WPA2 is the next generation in wireless security.

97
Q

command to encrypt all the passwords

A

service password-encryption

98
Q

Router(config)#enable password {password}

A

Enable – Used to get from User Exec mode to Privileged Exec mode. Not encrypted.

99
Q

Router(config)#enable secret {password}

A

Enable secret – Encrypts password (only use enable or enable secret, not both):

100
Q

Router(config)#line vty 0 4

Router(config-line)#password cisco

Router(config-line)#login

A

VTY – Needed if Telnet access is required:

101
Q

If you want to permit SSH into the router or switch Telnet lines, then you need to add the command

A

transport input ssh to the VTY lines.