SEM1 Flashcards

1
Q

FTP Port Numbers protocol

A

20/21 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

SSH port port

A

22 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Telnet port

A

23 TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

SMTP port

A

Simple Mail Transfer protocol | 25| TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

DNS port

A

Domain Name system| 53 | UDP and TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

DHCP port

A

Dynamic Host Configuration Protocol| 67 (server) 68 (client) | UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

HTTP port

A

Hyper text Transfer protocol | 80 | TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

POP3

A

Post office protocol| 110| TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

IMAP

A

Internet message access protocol | 143 | TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

SNMP

A

Simple Network Management Protocol | 161 | UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

HTTPS

A

Hyper Text Transfer Protocol Secure | 443 | TCP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

IMAP description

A

Internet message access protocol |

Messages stay on the server until the client deletes them

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

POP3 description

A

pop3 by default deletes messages after they are downloaded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

TFTP port

A

Trivial File Transfer protocol | 69 | UDP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

IPV6 address types

A

link local: FE80 or / 10 reserved 1111 1110 10 (FE80) links for two devices on the same network, internal
Global Unicast: routable on the web
Multicast: FF00::/8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Private IP adress range class A

A

10.0.0.0 /8 255.0.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

P IP address range class B

A

172.16.0.0 /12 255.240.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Pri address range class C

A

192.168.0.0/ 16 255.255.0.0

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Class A range

A

0-127.255.255.255 first bit must be 0 /8

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Class B range

A

128-191.255… first two bits must be 10 /16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Class C range

A

192-223.255… first three bits must be 110 /24

22
Q

Multicast range

A

224-239.255.. first 4 bits 1110

23
Q

experimental range

A

240-255.255.. first 4 bits are 1111

24
Q

IPV6 address char

A

128 bits represented by 8 blocks of 4 hexadecimal chars

25
IPV4 char
0.0.0.0 - 255.255.255.255 / | 32 bits
26
network utilization terms
bandwidth: theoretical capacity of the network Throughput: actual measure of data moving through interfaces Goodput: throughput- overhead
27
Describe the datalink layers sublayers
Link local control: interfaces with upperlayers to translate layer 2 to layer 3 MAC: interfaces with physical layer to tranlate packets to bits, in charge of encapsulation. customized encapsulation based on type of media being traversed
28
IPV6 IP4 simeltaneous usage techniques
dual stack: computers are equipped to process both at the network layer tunneling: ipv6 is tunnelled over IPv4 protocols translation:
29
collision mitigation
carries sense mutiple access collision avoidance: wireless | CSMA collision detection is wired
30
what two criteria are used t ohelp select a network medium
the distance the network med can carry a signal | The environment in which the medium will be installed
31
What is a shell and kernel
A shell interacts with the user and the kernel, it is the outer layer, usually a GUI interface Ther kernel interacts with the hadware and the shell, users may adjust the kernel through CLI
32
CTRL-C
exits congif and goes back to exec, when in setup aborts back to command prompt
33
ctrl-z
EXITS any config and goes back to priv exec
34
CTRL -SHIF-6
break from DNS tracerts and pings
35
Hostname chars
-start with a letter - contain no spaces end with a letter or digit use only letter digits and dashes be less than 64 chars
36
command to ecrypt all passwords
service-password-encryption
37
SVI
Switch virtual interface: describes the vlan 1 which can be used to manage switches via in-band methods such as ssh an telnet
38
IANA
Internet assigned numbers authority assigns protocol numbers ( registered ports) , domain names, and blocks IP addresses for RIRs (regional internet registries)
39
Well known port number range
0-1023
40
ipv6 improvemetns
simpler header with fewer fields for efficent packet handling, larger payload for increased throughput, way more address space, eliminates the need for NAT
41
Storage on routers types
NVRAM, non vol storage for startup config file Flash: non vol computer memory storage used for perm stor, contains the ios, logfiles, voice config files, html files, backup configs. ROM: POST teset, limited ios as backup if full ios corrupted of deleted, bootup information RAM: running config, ios image, routing table arp cache, packet buffer. All temp storage
42
router boot process
1. POST, then load bootstrap 2. locate and load cisco ios software 3. locate and load the startup config or enter setup mode
43
post
power on self test, first in router bootup process. Checks the hardware components to ensure router is functioning.
44
bootstrap
goes into actio after POST, get loaded from ROM into ram, main purpose is to locate the ios and load it into ram. Also loads the startup configuration file from nvram to ram.
45
test-net address range
198.51.100/203.0.113/192.0.02/ all /24s
46
link-local ipv4
169.254.0.0/16 this adress is also a sign that dhcp may not be working properly
47
SLAAC
Stateles address autoconfig, uses icmpv6 ,no central server, uses the routing prefix and clients own eui 64 address
48
data link layer
accept layer 3 packets and package them to frames perpare network data for layer 1 allowing upper layers to access media error detection
49
min and max frame sizes
1518: bigger considered giant 64: less considered a runt
50
What is needed to scale a network
network documentation, device inventory, budget, traffic analysis
51
sercutiy commands to lock down a router
service-password-encryption security-passwords min=length login block-for t secs attempts n within tsecs exec-timeout
52
enable ssh
step 1: give the router a unique host name and configure the ip domain name 2: keys must be generated for router to encrypt ssh traffic. crypto generate rsa gen-keys 3: create a local database username in global config 4: enable ssh in the line vty, login local, transport input ssh th router is now ready to use ssh