Network Stuff Flashcards

1
Q

What 2 ports are used by FTP? (File Transfer Protocol)

A

TCP Ports 20, and 21

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What port is used for Telnet?

A

TCP Port 23

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What port is used for SMTP? (Simple Mail Transfer Protocol)

A

TCP Port 25

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What port is used for TFTP? (Trivial File Transfer Protocol)

A

UDP Port 69

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What port is used for HTTP(Hyper Text Transport Protocol)?

A

TCP Port 80

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What port is used for POP3(Post Office Protocol)?

A

TCP Port 110

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What port is used for HTTPS?

A

TCP 443

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What does RAS stand for?

A

Remote Access Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

What does L2TP stand for?

A

Layer 2 Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What does PPTP stand for?

A

Point-to-Point Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What does SSTP stand for?

A

Secure Sockets Tunneling Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

What does RAID stand for?

A

Redundant Array of Independent Disks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The following describes what level of RAID? 1) Also known as disk striping. 2) Requires at least 2 hard disks. 3) Primarily implemented to increase speed. 4) No fault tolerance 5) Utilizes 100% of space from all hard disks

A

RAID 0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The following describes what level of RAID? 1) Also known as disk mirroring by providing an exact copy of another hard disk. 2) Implemented with exactly 2 hard disks. 3) High availability of data, extremely fault tolerant. 4) Slower performance since data has to be written twice. 5) Utilizes 50% of total disk space from both hard disks.

A

RAID 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The following describes what level of RAID? 1) Uses striping and has one disk dedicated to creating parity. 2) Requires at least 3 hard disks to implement. 3) Each hard disk should be the same capacity. 4) Used for a combination of fault tolerance and speed. 5) Calculating parity will slow down the performance slightly due to CPU usage. 6) The amount of space available is determined by the formula 1 -1/n (where n is the # of hard disks)

A

RAID 3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The following describes what level of RAID? 1) The same as RAID 3 except parity is striped with the data

A

RAID 5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The following describes what level of RAID? 1) Requires at least 4 hard disks to implement. 2) Uses striping and creates 2 parity stripes that are striped with the data. 3) Extremely high fault tolerance since 2 disks could fail and still have recoverable data. 4) Requires a complex controller to implement. 5) The amount of space available is calculated by 1-2/n

A

RAID 6

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

The following describes what level of RAID? 1) Also known as mirroring and striping. 2) Requires at least 4 hard disks and must be an even # of hard disks. 3) Extremely fault tolerant allowing multiple hard disk failures. 4) Amount of space available is 50% of total space from all hard drives.

A

RAID 10

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The following describes what level of RAID? 1) Also known as RAID 5+0 and combines striping and RAID 5. 2) Requires at least 6 hard disks to implement. 3) Extremely fault tolerant while still maintaining high performance and data transfer rates. 4) Total available space is calculated by 1-1/n (where n is the # of disks used in each RAID 5 implementation

A

RAID 50

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

What does SCSI stand for?

A

Small Computer System Interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

What does SAS stand for?

A

Serial Attached SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

What are the 4 components in a SAS system?

A

1) Initiator 2) Target 3) Service Delivery Subsystem 4) Expanders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What does SATA stand for?

A

Serial Advanced Technology Attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What does SAS stand for?

A

Serial Attached SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

What are the 4 components in a SAS system?

A

1) Initiator 2) Target 3) Service Delivery Subsystem 4) Expanders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What does SATA stand for?

A

Serial Advanced Technology Attachment

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Name the 3 types of backups?

A

1) Full 2) Incremental 3) Differential

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

What port is used for NTP? (Network Time Protocol)

A

UDP Port 123

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

What port is used for IMAP? (Internet Message Access Protocol)

A

TCP Port 143

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What does VTP stand for?

A

VLAN Trunking Protocol

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Do the ends of a SCSI bus need termination?

A

Yes

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

What interface has 8 bit width - clock speed = 5Mhz and Bandwidth = 5 MBps?

A

SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

What interface has 8 bit width - clock speed = 10Mhz and Bandwidth = 10MBps?

A

Fast SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

What interface has 16 bit width - clock speed = 10Mhz and Bandwidth = 20MBps?

A

Fast Wide SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

What interface has 8 bit width - clock speed = 20Mhz and Bandwidth = 20MBps?

A

Ultra SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

What interface has 16 bit width - clock speed = 20Mhz and Bandwidth = 40MBps?

A

Ultra Wide SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

What interface has 8 bit width - clock speed = 40Mhz and Bandwidth = 40MBps?

A

Ultra2 SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

What interface has 16 bit width - clock speed = 40Mhz and Bandwidth = 80MBps?

A

Ultra2 Wide SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

What interface has 16 bit width - clock speed = 80Mhz and Bandwidth = 160MBps?

A

Ultra 3 SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

What interface has 16 bit width - clock speed = 160Mhz and Bandwidth = 320MBps?

A

Ultra 320 SCSI

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

What does LUN stand for?

A

Logical Unit Numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

What interfaces are LUN’s used by?

A

SCSI, iSCSI, and Fibre Channel to identify a logical unit on a bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

What are two other ways to indentify a LUN?

A

SCSI Device ID, and Disk serial numbers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

What two interfaces do not need a unique ID or termination, and are full duplex switched serial point to point connections?

A

SAS, and SATA

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

What is the main difference between SAS, and SATA?

A

The power and data connectors are separated in SATA and one piece for SAS. You can connect a SAS to a SATA drive, but not vice versa

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

What port does DNS (Domain Name Service) utilize?

A

DNS utilizes TCP port 53 and UDP port 53

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

What port does NNTP (Network News Transfer Protocol) utilize?

A

NNTP utilizes TCP port 119

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

What port does SNMP (Simple Network Management Protocol) utilize?

A

SNMP utilizes UDP port 161

49
Q

What port/s does DHCP (Dynamic Host Configuration Protocol) utilize?

A

DHCP utilizes UDP ports 67 and 68

50
Q

When referring to the OSI model, the term “data” would refer to what layer/s?

A

Application, Presentation, and Session - The top 3 layers in that order.

51
Q

When referring to the OSI model, the term “segment”, would refer to what layer/s?

A

Transport layer

52
Q

When referring to the OSI model, the term “packet”, would refer to what layer/s?

A

Network layer

53
Q

When referring to the OSI model, the term “frame” would refer to what layer/s?

A

Data Link layer

54
Q

When referring to the OSI model, the term “bit” would refer to what layer/s?

A

Physical layer

55
Q

Name the layers of the OSI model

A

Application, Presentation, Session, Transport, Network, Data Link, and Physical.

56
Q

The following protocols and services run at which layer of the OSI model:

  • Email protocols SMTP and POP3
  • Telnet
  • HTTP
  • File Transfer Protocol (FTP)
  • Simple Network Management Protocol (SNMP)
  • Authentication (Anything dealing with user input)
A

Layer 7 aka The Application layer

57
Q

What layer of the OSI model would the following full under:

  • Compatibility with the operating system
  • Proper encapsulation of data for network transmission
  • Data formatting
  • Data encryption, compression, and translation
A

Layer 6…aka The Presentation Layer

58
Q

This OSI layer handles the creation, maintenance, and teardown of communications two hosts

A

Layer 5….aka The Session Layer

59
Q

The OSI layer responsible for establishing logical end-to-end connections between systems. Making sure the segments get to their destination in the correct order and free of errors using either TCP or UDP protocol’s.

A

Layer 4…aka The Transport Layer

60
Q

IP runs at this layer of the OSI. Often referred to as “the routing layer”

A

Layer 3…aka The Network Layer

61
Q

Basic switches operate at this layer of the OSI? MAC addresses are also utilized at this level, and error detection, but “Not” error recovery. The following terms are associated at this level as well:

  • Ethernet
  • High Data Link Control (HDLC)
  • Point-to-Point Protocol(PPP)
  • Frame Relay
A

Layer 2…aka The Data Link Layer

62
Q

What are the 4 layers of the TCP/IP model?

A

Application, Transport, Internet (Internetwork), and Network Access

63
Q

The OSI model layers of Application, Presentation, and Session, refer to what layer of the TCP/IP model?

A

Application layer

64
Q

What is the process called when a sender waits for a positive message from the recipient that data was received, and if that message isn’t received, the data is retransmitted?

A

Positive Acknowledgement with Retransmission (PAR)

65
Q

What are the only 3 values TCP and UDP headers have in common?

A

Source port, Destination port, and Checksum

66
Q

What does the term “socket” refer to?

A

The combination of IP address and port number

67
Q

SSH (Secure Shell) utilizes what port?

A

TCP port 22

68
Q

What port does SSL (Secure Socket Layer) utilize?

A

TCP port 443

69
Q

The entire range of UDP ports from 16384 - 32767 are reserved for what type of traffic?

A

Voice

70
Q

Fast Ethernet is defined by what IEEE standard? Also what is the maximum capacity?

A

IEEE 802.3U, and the maximum capacity is 100MBPS

71
Q

Gigabit Ethernet is defined by what IEEE standard? Also what is the maximum capacity?

A

IEEE 802.3z and 802.3ab. Also the maximum capacity is 1000MBPS

72
Q

What is the broadcast MAC address?

A

FF-FF-FF-FF-FF-FF

73
Q

What does the 1st half of a multicast MAC address always start with?

A

The 1st half is always 0100.5e. The 2nd half will be in the range of 00-00-00 through 7F-FF-FF.

74
Q

A Cisco switch will do one of the three things with an incoming frame?

A

Forward it, Flood it, or Filter it

75
Q

What is the 1st thing a Cisco switch is going to look at with an incoming frame before deciding what to do with that frame.

A

It is going to look at the source MAC address 1st, and then use that address to dynamically build the MAC address table.

76
Q

In the world of Cisco switching, what is the term used when describing what a switch does when it receives an unknown unicast frame

A

It floods the switch.

77
Q

What does a Cisco switch do with an incoming frame that’s determined to have the source port identical to the destination port.

A

The switch will filter (drop) the frame. ** Switches never send a frame back out the same port it came on **

78
Q

When a switch does have have an entry for an incoming frames destination MAC address, what term is used to describe what it does with that frame.

A

The switch will forward it.

79
Q

What are the 3 processing methods a switch would used when forwarding a frame?

A

Store-and-forward (Stores entire frame and checks it for errors in its entirety), cut-through (No error checking), fragment-free (checks the 1st 64 bytes for errors)

80
Q

What are the three layers of the Cisco switching model?

A

Access, Distribution, and Core

81
Q

What is the protocol used in switching that determines a loop free path for frames, and ports that are not on that path will be placed into blocking mode?

A

STP (Spanning Tree Protocol) - STP, which is enabled on switches by default, uses the port speeds along a path to determine the overall cost and the best paths

82
Q

What are 3 things that can be done on a switch as a basic security measure?

A

1) Close unused ports with the shutdown command
2) Prevent the port from trunking with the switchport mode access command
3) Place the port into a unused VLAN

83
Q

What are 3 types of port security violation modes?

A

Protect, Restrict, Shutdown

84
Q

Going from highest to lowest, double the number 1 7 times.

A

128 64 32 16 8 4 2 1

85
Q

What is the class A address range, class B, class C, class D, and class E

A
Class A address range is 1 - 126
Class B address range is 128 - 191
Class C address range is 192 - 223
Class D address range is 224 - 239  **Reserved for multicasting**
Class E address range is 240 - 255
86
Q

Ad Hoc WLAN’s (Wireless devices communicating with no WAP involved) are also called what?

A

Ad hoc networks are also called iBSS or IBSS (Independent Basic Service Sets)

87
Q

Name the two common kinds of infrastructure WLAN’s.

A

BSS (Basic Service Set) - utilizes a single access point

ESS’s (Extended Service Set) - utilizes multiple AP’s

88
Q

Name the 4 common types of 802.11x wireless standards and be familiar with their operating frequencies and max speeds

A

1) 802.11a - 25 MBPS typical - Max 54 MBPS - 5 GHz
2) 802.11b - 6.5 MBPS typical - Max 11 MBPS - 2.4 GHz
3) 802.11g - 25 MBPS typical - Max 54 MBPS - 2.4 Ghz
4 802.11n - 200 MBPS typical - Max 540 MBPS - 2.4 Ghz and 5 GHz ** Also increases indoor range to 160 feet **

89
Q

What are 3 types of wireless Spread Spectrum methods?

A

1) FHSS - Frequency Hopping Spread Spectrum - Sender and receiver agree on a range to use - Bluetooth
2) DSSS - Direct Sequence Spread Spectrum - Spreads signal over entire range of frequencies at once - .11b, .11g, .11n
3) OFDM - Orthogonal Frequency Division Multiplexing - Splits the signal and sends fragments over different frequencies at the same time - .11a

90
Q

What is CSMA/CD and CSMA/CA.

A

CSMA/CD is Carrier Sense Multiple Access Collision Detection
* Used with Ethernet Networks*
CSMA/CA is Carrier Sense Multiple Access Collision Avoidance
** Used with Wireless Networks **

91
Q

What are the 3 types of wireless security standards?

A

WEP - Wired Equivalent Privacy - least secure
WAP - Wi-Fi Protected Access - More secure
WAP2 - Most secure

92
Q

What are the two forms of authentication WEP supports?

A

The two forms of authentication the WEP supports are:
Open and Shared key - Shared key considered to be less secure because of the “clear text challenge” the AP sends to the host.
** Also WEP uses One way authentication **

93
Q

What protocol does WPA2 implement that allows is to be considered “fully secure”?

A

Through the use of CCMP (Counter Mode with Cipher Block Chaining Message Authentication Code Protocol) WPA2 is considered to be “fully secure”

94
Q

What are the 3 vital functions that VPN’s (Virtual Private Networks) offer?

A

1) Data origin Authentication - allows receiver to guarantee source of the packet
2) Encryption
3) Integrity - receiver’s ability to ensure that the data was not affected or altered in any fashion as it traveled across the VPN

95
Q

What are the 3 different protocols that can be used to create VPN’s?

A

1) GRE (Generic Routing Encapsulation) - No encryption scheme
2) L2TP (Layer 2 Tunneling Protocol) - Hybrid of PPTP and Cisco’s L2F - Also no encryption scheme
3) IPSec (IP Security) - Encryption and Authentication

96
Q

What layer of the OSI does L2TP operate?
How about SSH(Secure Shell)?
S/MIME(Secure/Multipurpose Internet Mail Extensions)?
SSL(Secure Socket Layer)?

A

L2TP operates at layer 2 (Data Link layer) of the OSI model
SSH and S/MIME operate at layer 5 (Application layer)
SSL operates at layer 4 (Transport layer) ** Some documentation may have it running at layer 7 (presentation layer) **

97
Q

What are 2 general types of remote access VPN’s?

A

1) Client initiated - Remote user will use a VPN client to create a secure tunnel across a ISP’s network.
2) Network Access Server Initiated - Misleading because still initiated by the client, but is started by accessing a NAS, and the NAS will then create the tunnel.

98
Q

What is the size of the key used to encrypt data with DES?

A

DES uses a 56 bit key to encrypt data, thus making it very vulnerable
** Triple DES aka TDES, aka 3TDES…avoid using 3DES. is used to increase the size of the key to 112 bits (effective security) **

99
Q

What encryption standard is being widely adopted around the world and can be run on any Cisco router that has IPSEC DES/TDES capability

A

AES (Advanced Encryption Standard)

100
Q

What are the two encryption schemes?

A

1) Symmetric - aka Secret Key Encryption - Same key used for both encryption and decryption - Variations include stream algorithms
2) Asymmetric - Two keys for both sender and receiver - This PKE involves a public and private key for each user and before starting the encryption process the public key should be verified by a 3rd party called a CA(Certificate of Authority)

101
Q

Name a very well known PKE (Public Key Encryption) scheme

A

RSA (Ron Rivest, Adi Shamir, and Len Adelman) is a well known PKE scheme

102
Q

What algorithm allows the exchange of secret keys over a non-secure communications channel?

A

The Diffie-Hellman algorithm aka Exponential key agreement was developed in 1976 but still used today around the world.

103
Q

IPSec is a combination of what 3 protocols?

A

1) Authentication Header (AH) - defines a method for authentication and securing data
2) Encapsulating Security Payload (ESP) - defines a method for authenticating, securing, and encrypting data
3) Internet Key Exchange (IKE) - negotiates the security parameters and authentication keys

104
Q

AH (Authentication Header) Offers 3 things:
1) Data origin authentication
2) Data integrity
3) Anti-replay protection (optional)
What is the one thing it does not have? What does offer it?

A

The one thing AH does not offer is Data confidentiality. ESP (Encapsulating Security Payload) does.

105
Q

What are the two modes AH and ESP can be run in?

A

1) Tunnel Mode - Entire IPSec process is transparent to the end hosts and uses specialized IPSec gateway devices to handle the workload.
2) Transport Mode - End hosts themselves perform the encapsulation meaning IPSec has to be running on both hosts. No new IP header is attached using transport mode

106
Q

What does STP stand for? What is the purpose of it?

A

STP - Spanning Tree Protocol - Is set by default in switches to prevent switching loops….FYI - Does not have anything to do with routing loops.

107
Q

What is the order of STP port states as a port goes from blocking to forwarding?

A

Blocking - Frames are not forwarded, but BPDUs are accepted

Listening - Frames are not forwarded, and the MAC address table is not yet being built

Learning - Frames are not forwarded. MAC addresses are being learned and the MAC address table is being built

Forwarding - Frames are forwarded, MAC addresses are still learned

108
Q

In some material there is a fifth state in the order of STP going from blocking to forwarding, what is that state?

A

The 5th state is disabled - Port is disabled and cannot accept BPDUs

109
Q

Given 2 switches connected via a crossover cable, when STP converges, of the 4 ports, how many will be blocked?

A

Only 1 port will be blocked once STP converges.

110
Q

What are the terms and values for the Hello BPDU’s used by all bridges in identifying situations when the STP algorithm needs to be run again?

A

Hello Time - Time between Hello BPDUs - Default - 2 sec

Max Age - The bridge should wait this amount of time after not hearing a Hello BPDU before attempting to change the STP topology - Default - 20 sec

Forward Delay - The amount of time a port should stay in the listening and learning stages as it changes from blocking to forwarding mode - Default - 15 sec

111
Q

What is Portfast? and when should it be used?

A

Portfast allows a port to go from blocking to forwarding immediately - ** Should only be used on ports that are connected to an end user device (PC), not to other networking devices **

112
Q

What is trunking?

A

Trunking is the process of allowing VLAN traffic to flow over physically connected switches

113
Q

What is ISL?

A

ISL is Inter-Switch Protocol which is a Cisco proprietary trunking protocol. note Only used between Cisco switches where the entire frame is encapsulated before transmission across the trunk

114
Q

What is IEEE 802.1Q?

A

IEEE 802.1Q - Aka - “dot1q” is the industry standard trunking protocol…(Used with non-Cisco switches)
Dot1q does not encapsulate the entire frame, rather it places a 4-byte header on the Ethernet header indicating the desired VLAN

115
Q

What has more overhead? ISL or Dot1Q?

A

ISL has significantly more overhead because it encapsulates every single frame. In contrast Dot1Q does not even place the 4-byte header on the native VLAN.

116
Q

What are the five configuration modes options for trunk ports?

A

On - Trunk unconditionally
Off - Setting port to be an access port
Auto - Dynamic trunking mode set to auto
Desirable - Dynamic trunking mode set to desirable
Nonegotiate - Permanent trunking mode, but DTP frames are not sent across the trunk

117
Q

What is VTP?

A

VTP is a Cisco proprietary virtual trunking protocol - Allows switches to advertise VLAN information between other members of the same VTP domain - Allows consistent view of the switched network across all switches.

118
Q

What are the 3 separate VTP modes?

A

Client mode - Cannot modify, create, or delete VLANs. Also VTP clients cannot retain VLAN configuration information upon reboot

Server mode - VLANs can be created, modified, and deleted. Changes are advertised to all switches in the VTP domain. VLAN configuration information is kept in NVRAM

Transparent mode - Forward VTP advertisements received from other switches, but do not process the information contained in those ads. VLANs can be created, deleted, and modified, but those changes are not advertised, and are therefore locally significant only.

119
Q

What are the 4 types of memory used in switches and routers, and what is the purpose of each one.

A

1) ROM - Stores the router’s bootstrap startup program, operating system software, and POST
2) Flash Memory - IOS images are stored here - content is retained by the router on reload
3) RAM - Stores operational information such as routing tables and the running configuration file - content is lost when powered down or reloaded
4) NVRAM - Holds routers startup configuration - Contents are retained when the router is powered down or reloaded.