Intro Flashcards

1
Q

Peer to peer network characteristics

A

Lacks centralised administration
Easy to create
Less cost to implement

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Intermediary devices

A

Connect individual hosts to the network

Direct the path of data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Connection options that provide always-on, high-bandwidth internet connection to computers in a home office

A

Cable

DSL

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Functions provided to users by context-sensitive help feature of Cisco, IOS CLI

A

Displaying a list of all available commands in current mode.

Determining which option, keyword, or argument is available for the entered command.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Which two host names follow the guidelines for naming conventions on Cisco IOS devices

A

SW Branch 799

RM-3 Switch-2A4

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

How dose the (service password-encryption) enhance password security on Cisco routers and switches

A

Ot encryptions the passwords that are stored in router or switch configuration files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What’s are the 2 characteristics of RAM on a Cisco device

A

The contents of the RAM are lost during a power cycle.

The configuration that is actively running on the device is stored in the RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

IOS modes

A
Int config mode
Priv exe mode 
Line config mode
Global config mode
User exe mode
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Client to webserver

Order of the protocol stack

A

HTTP
TCP
IP
Ethernet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

3 application layer protocols are park of the TCP/IP protocol suite

A

DHCP
DNS
FTP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What are the proprietary protocols

A

Protocols developed by organisations who have control over there definition and operation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which 3 layers of the OSI model are comparable in function to the application layer of the TCP/IP model

A

Application
Presentation
Session

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

At which layer of the OSI model would a logical address be encapsulated

A

Network layer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which PDU (Protocol Data And Unit) format is used when bits are revived from network medium by the NIC of a host

A

Frame

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which characteristics describes the default gateway of a host computer

A

The logical address of the router interface on the same network as the host computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

ISOC

A

Promotes the open development evolution and use of the internet throughout the world

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

ISO

A

Largest developer of international standards in the world for a wide variety of products and services, known for OSI model

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

IANA

A

Responsible for the overseeing and managing of IP addresses, domain name management and protocol identifiers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Throughput

A

Measure of bits transferred across the media over a given period of time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What interference would electrical cables and fluorescent lights have on CAT cabling

A

EMI

RFI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Data link layer provides

A

Accepts layer 3 packets and encapsulates them into frames.

Provides media access control and provides error detection:

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What is true concerning physical and logical topologies

A

Logical topologies refer to how a network transfers data between devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Star topology

A

End devices connect to a central intermediate device, which in turn connects to other central intermediate devices

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is contained in the trailer of a data link frame

A

Error detection

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
What is the function of the CRC value that is found in the FCS field of a frame
To verify the integrity of the revived frame
26
Data link sub layer that identifies the network layer protocol encapsulated in the frame
LCC logical link control
27
Combination of point to point, HUB, spoke and mesh topology
Hybrid
28
Ethernet frame sizes MAX MIN
1518 | 64
29
Ethernet
Defines the most common type of LAN in the world.
30
Function and features of logical link control sub layer in Ethernet standards
LLC is implemented in the software. | The data link layer uses LLC to communicate with the upper layers of the protocol suite.
31
MAC addresses
Must be globally unique
32
Destination addresses used in ARP request frame
FFFF.FFFF.FFFF
33
When a device is sending data to another device on a remote network, the Ethernet frame is sent to the MAC address of the default gateway
True
34
The potential network problems that can result from ARP operation
Network attackers could manipulate MAC addresses and IP addresses mappings in ARP messages with the intent of intercepting network traffic. On large networks with a low bandwidth, multiple ARP broadcasts could cause data communication delays.
35
Collision fragment
Runt frame
36
On a Cisco switch, WHAT? memory buffering is used to buffer frames in queues linked to specific incoming and outgoing ports
Port-based
37
ARP WHAT? is a technique that is used to send fake ARP messages to the other hosts in the LAN. The aim is to associate IP addresses to the wrong MAC addresses
Spoofing | ARP poisoning
38
Which statement is true about MAC addresses
The first three bytes are used by the vendor assigned OUI (Organisationally Unique Identifier)
39
2 characteristics of IP
Operates independently of the network media. | Dose not require a dedicated end to end connection.
40
When a connectionless protocol is in use of l lower layer of the OSI model, how is missing data detected and retransmitted
Upper layer connection-oriented protocols keep track of the data received and can request retransmission from the upper-level protocols on the sending host.
41
Whatcha field in the IPv4 header is used to prevent a packet from transversing a network endlessly
Time-To-Live
42
What IPv4 header field identifies the upper layer protocol carried in the packet
Protocol
43
What is one advantage that the IPv6 simplified header offers over IPv4
Efficient packet handling
44
What type of route is indicated by the code C in an IPv4 routing table on a Cisco router
Directly connected route
45
What routing table entry has a next hop address associated with a destination network
Remote routes
46
Following default settings what is the next step in the router boot sequence after the los IOS loads from
Locate and load the startup config file from NVRAM
47
2 types of router interfaces
WAN | LAN
48
Which 2 pieces of information are in RAM of a Cisco router during normal operation
Cisco IOS. | IP Routing Table.
49
What is the purpose of the startup configuration file on a Cisco router
To contain the commands that are used to initially configure a router on startup.
50
Which 3 commands are used to set up secure access to a router through a connection to the console interface
Login Password Cisco Line console 0
51
Which characteristics describes an IPv6 enhancement over IPv4
The IPv6 header is simpler than the IPv4 header is, which improves packet handling
52
How many bits in IPv4 address
32
53
Which 2 parts are components of an IPv4 address
Network portion | Host portion
54
What is the purpose of a subnet mask
To determine the subnet to which the host belongs
55
A message sent to all hosts on a remote network
Directed broadcast
56
What are the 3 characteristics of a multicast transmission
A single packet can be traced to a group of hosts. Multicast transmissions can be used by routers to exchange routing information. The range 244.0.0.0 to 244.0.0.255 is reserved to reach multicast groups on a local network.
57
Which 2 IPv4 to IPv6 transition techniques manage the interconnection of IPv6 domains
Dual stack | Tunnelling
58
Abbreviate 3FFE:1044:0000:00ab:0000:0000:0057
3FFE:1044:0:0:AB::57
59
2 types of IPv6 unicast addresses
Loop back | Link local
60
What are the 3 parts of an IPv6 global unicast address
A global routing prefix that is used to identify the network portion of the address provided by a ISP. An interface ID that is used to identify networks inside of the local enterprise site. A subnet ID that is used to identify networks inside of the local enterprise site.
61
Which protocol supports stateless address auto configuration (SLAAC) for the dynamic assignment of IPv6 addresses to a host
ICMPv6
62
What is the purpose of ICMP messages
To provide feedback of IP packet transmissions
63
What is indicated by a successful ping to the ::1 IPv6 address
Up is properly installed on the host
64
What field context is used by the ICMPv6 to determine that a packet has expired
Hop limit field
65
169. 254.1.5 192. 0.2.123 240. 2.6.255 172. 19.20.5 127. 0.0.1
``` Link local Test net Experimental Private Loopback ```
66
A user is using traceroot, at which point would a router stop forwarding the packet
When the value in the TTL field reaches Zero
67
What is the result of connecting 2 or more switches together
The size of the broadcast domain is increased
68
What are the 2 reasons network administrators nights want to create subnets
Imported network performance. | Easier to implement security policies.
69
If a network device has a mask of | /28, how many IP addresses are available for hosts on the network
14
70
How many bits must be borrowed from the host portion of an address to accommodate a router with 5 connected networks
3
71
Last address (Broadcast)
(Net + Inc) -2
72
Increment
256-Mask
73
Host range
2 power of bits /29 .248 11111000 E.g. 5 SN = 2 to the 5 = 32 3 host bits = 2 to the 3 = 8 -2(BC&NetID) =6
74
IPv6 Global Unicast Multicast Link Local Loopback Address
2&3001 FF FE80 ::1
75
Router boot up
POST Bootstrap loader Load IOS Config
76
Port requested from IANA in order to be used with a specific application.
Registered
77
Well known ports
0-1023
78
Which factor determines TCP window size
Amount of data the destination can process at one time
79
TCP session acknowledgement number represents
The next byte the destination expects to receive
80
What information is used by TCP to reassemble and reorder received segments
Sequence numbers
81
What dose TCP do if the sending source detects network congestion on the path to the destination
The source will decrease the amount of data it sends before it must receive acknowledgements from the destination
82
3 application layers using TCP
SMTP FTP HTTP
83
Well known port numbers registered Port numbers | HTTP Protocol standard
0-1023 1024-49151 80
84
Associated application layer protocol
Telnet | DNS
85
TCP/IP model layer used for formatting, compression and encryption
Application
86
Characteristics of the application layer of the TCP/IP model
Closest to end user | The creation and maintenance of dialogue between source and destination applications
87
SNMP
Simple Network Management Protocol
88
Peer to peer
Data exchange between 2 devices without a server
89
What do client/server and peer to peer network models have in common
Both models support devices in server and client roles
90
IMAP
Messages are kept in servers until detected from client machine
91
GET, PUT, POST
HTTP
92
DHCP discover message
The message comes from a client seeking a IP address. | All hosts receive the message, but only a DHCP server replys
93
Top level DNS domain
.com
94
SMBP Simple Message Block Protocol
Clients establish a long term connection to servers
95
Application layer protocol used to provide file share and print services to Microsoft applications
SMB
96
GET message
HTTP request from client to server
97
Firewall feature used to insure legitimate packets
State full packet inspection
98
Pre SSH steps
Give router host and domain name. | Generate set of secret keys for encryption.
99
CDP on Cisco device
CDP can be displayed globally or on a specific interface
100
Arp-d command
ARP cache is cleared
101
-6
Forces trace root to use IPv6
102
Display log messages on remotely connected sessions using telnet or SSH
Terminal Monitor
103
4 types of Network Attack
Reconnaissance Access DoS Malicious Coda
104
Access attacks
``` Password Trust exploration Port exploration Port redirection Man in the middle ```
105
Mitigating Network Attacks
Device hardening-Remove software not in use. Antivirus Personal firewalls Operating system patches
106
Private Addresses
10. 0.0.0/8 172. 16-31.0.0/16 192. 168.0-255
107
ICMP
Internet Control Message Protocol
108
SVI
Switched Virtual Interface - Virtual LAN
109
Secure access to 3rd party's
Extranet
110
Service password-encryption
Prevents a look over the shoulder on running config
111
PDU
Protocol Data Unit | Packet
112
Wireless
Radio Wave
113
CSMA/CD
Carrier-Sense Multiple Access | Collision Detection
114
ROM
Bootstrap. Basic Diagnostic Software. Limited IOS (Internetwork Operating System)
115
RAM - Volatile
Running config. IP routing table. MAC mappings in ARP cache.
116
NVRAM
Start up config
117
Transport Layer | 3services
Flow control. Connection Establishment. Error Recovery.
118
DHCP
Default gateway address. | Subnet mask.
119
Shell
Closet to the user | Between user and Kernel
120
Kernel
Part of the OS.
121
TCP
Transport Control Protocol