Vol 2 Part 1: IP Access Control Lists Flashcards Preview

CCNA Volume 2 > Vol 2 Part 1: IP Access Control Lists > Flashcards

Flashcards in Vol 2 Part 1: IP Access Control Lists Deck (29)
Loading flashcards...
1

What layer does error recover and flow control happen at?

Layer 4

2

Between UDP and TCP, which provides error recover?

TCP

3

TCP is defined in RFC# what?

RFC 793

4

Multiplexing relies on a concept known as a *BLANK*

Socket

5

What are the 3 things inside of a socket?

IP Address, Transport Protocol, and Port Number

6

What is multiplexing?

Streaming multiple pieces of data within a single stream.

7

What do the port numbers determine when multiplexing?

Port numbers are used to determine the data and its destined application

8

What range of ports are the well known ports that are assigned by the Internet Assigned Numbers Authority (IANA)?

0-1023

9

What range of ports are considered user registered ports?

1024-49151

10

What are the two types of general protocols used with connections?

Connection-oriented (TCP) and connectionless (UDP)

11

Connection-oriented protocols require an exchange of messages before or after data transfer begins?

Before. A pre established correlation is made between two endpoints. This is TCP.

12

True or Fales: Connectionless protocols do NOT require an exchange of messages or correlation?

TRUE

13

What fields within the TCP header are used to ensure reliability of data transfer?

SEQ and ACK

14

Windowing allows the receiving end to let the sending end know what?

How much data it can receive at the current moment

15

The receiving device will send a *BLANK* message to the sender to indicate either an increase or a decrease in its availability to receive data.

Window message

16

What is the uniform resource identifier (URI)?

The web address typed or clicked ot access a page

17

What are the three key components of a URI?

Protocol, Server Name, and Web Page

18

Web pages typically have multiple files called *BLANK*

objects

19

What are the two basic types of Access Control Lists (ACLs)?

Standard and Extended

20

Standard and Extended ACLs have two main sub types; what are they?

Numbered and Named

21

What is the difference between a standard and an extended ACL?

A standard ACL just uses a matching Source IP
An extended ACL using a matching source AND destination IP, as well as a source and destination port.

22

Where do ACLs reside?

On the router

23

What command is used to create an ACL?

ip access-list *standard or extended* *name of ACL*

24

When creating a rule to permit/deny a range of IP addresses, what is typed in after the IP address to signify the range of IPs?

A wildcard

25

Explain how a wild card works with regards to the permitted/denied range of IPs?

An octet in the wild card containing a number other than 0 corresponds to the octet in the IP address. This octet will be ignored when the ACL is choosing to permit or deny an IP address. For example. the command "access-list 1 permit 10.1.1.1" will permit that IP address only. However, the command "access-list 1 permit 10.1.1.0 0.0.0.255" will permit any IP address in the range 10.1.1.0-10.1.1.255

26

A standard access list has what for a default initial range?

1-99

27

A standard ACL should always be placed where in relation to the source and destination?

As close to the destination as possible

28

An extended ACL should always be placed where in relation to the source and destination?

As close to the source as possible

29

In general, where should your more specific rules in your ACL be placed within the ACL and why?

Towards the beginning. This is because the ACL will check the rules in order from first to last. If you want to deny a specific IP address, but it is within a range of permitted IP addresses, the IP address will be permitted if the router hits the permit rule for that range before it hits the deny rule for that specific IP.