• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/95

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

95 Cards in this Set

  • Front
  • Back
Fast Ethernet is defined by _____________. It has a maximum cable length of ____________. It runs at ________.
IEEE 802.3u; 100 meters; 100 Mbps.
Gigabit Ethernet is defined by ____________. It has a maximum cable length of ___________. It runs at ___________.
IEEE 802.3z ans 802.ab; 100 meters; 1000 Mbps
Ethernet runs at ____ Mbps, is defined by __________ and its copper cable has a maximum length of __________.
10; IEEE 802.3; 100
10Base2 and 10Base5 run on what is known as a ____________ bus.
shared cable
Pins used for transmitting a signal are _______. Pins used for receiving a signal ________.
Pins 1 and 2; Pins 3 and 6.
Mac addresses are _____ bits long.
48
Broadcast MAC Address
FF-FF-FF-FF-FF-FF
Multicast MAC address - the first half is always ________________. The second half can be in a range from ______ to _______.
01-00-5E; 00-00-00; 7F-FF-FF
Rollover cables are used to connect a PC __________ to a router or switch ____________.
serial port; console port
Data Communications Equipment (DCE) ____________ the clockrate.
provides
Data Terminal Equipment (DTE) ___________ the clockrate.
receives
By default, a Cisco router acts as a __________.
Data Terminal Equipment (DTE)
PPP allows ____________, ___________, and _____________ to be configured while HDLC does not.
data compression; multilink; the use of two authentication schemes (PAP and/or CHAP)
____________________ allows for multiple physical channels to be bundled into a single logical channel.
PPP Multilink
Name two authentication schemes allows by PPP for point-to-point links.
PAP ans CHAP
Name the default encapsulation on a Cisco router's interface.
HDLC
This is used to dynamically learn the data-link address of an IP host connected to a LAN
ARP
This learns routes and puts those routes in a routing table
Routing Protocol
This defines the type of packet forwarded through a network.
Routed Protocol
Any device that can send and receive IP packets
IP host
RFC 791 defines what protocol?
IP protocol including several classes of devices.
How many reserved host addresses are there per network?
Two
Name the Class A Valid Network Numbers
1.0.0.0 to 126.0.0.0
Name the Class B Valid Network Numbers
128.0.0.0 to 191.255.0.0
Name the Class C Valid Network Numbers
192.0.0.0 to 223.255.255.0
What's the total number and binary exponent value of the class A network?
2 to the 7th power – 2 (126)
What's the total number and binary exponent value of a class B network?
2 to the 14th power (16,384)
What's the total number and binary exponent value of a class C network?
2 to the 21th power (2,097,152)
Number of Hosts on a Class A network? (exponent calculation and total)
2 to the 24th power – 2 (16,777,214)
Number of Hosts on a Class B network? (exponent calculation and total)
2 to the 16th power – 2 (65,534)
Number of Hosts on a Class C network? (exponent calculation and total)
2 to the 8th power – 2 (254)
This is the time between losing the route and finding a working
replacement route
convergence time
This uses the Internet Control Message Protocol (ICMP), sending a message called an ICMP echo request to another IP address. The computer with that IP address should reply with an ICMP echo
reply.
Ping (Packet Internet Groper)
What is the Class A reserved range of IP addresses?
10.0.0.0 to 10.255.255.255
What is the Class B reserved range of IP addresses?
172.16.0.0 to 172.31.255.255
What is the Class C reserved range of IP addresses?
192.168.0.0 to 192.168.255.255
This consists of three things: an IP address, a transport protocol, and a port number.
A socket
Dynamic port numbers range starts at _________.
1024
This consists of three things: an IP address, a transport protocol, and a port number.
A socket
Dynamic port numbers range starts at _________.
1024
Port numbers below ___________ are reserved for well-known applications
1024
This consists of three things: an IP address, a transport protocol, and a port number.
A socket
Dynamic port numbers range starts at _________.
1024
Port numbers below ___________ are reserved for well-known applications
1024
Dynamic port numbers range starts at _________.
1024
This consists of three things: an IP address, a transport protocol, and a port number.
A socket
Port numbers below ___________ are reserved for well-known applications.
1024
FTP data uses TCP Port ______.
20
Port numbers below ___________ are reserved for well-known applications
1024
FTP data uses TCP Port ______.
20
Dynamic port numbers range starts at _________.
1024
FTP control uses TCP Port ______.
21
FTP data uses TCP Port ______.
20
SMTP uses TCP Port ______.
25
Telnet uses TCP Port ______.
23
DNS uses TCP and UDP Port ______.
53
DHCP uses UDP Port ______.
67 and 68
TFTP uses UDP Port ______.
69
HTTP (WWW) uses TCP Port ______.
80
POP3 uses TCP Port ______.
110
SNMP uses UDP Port ______.
161
SSH uses TCP Port _______.
22
SSL uses TCP Port ______.
443
RTP-based Voice (VoIP) and Video use UDP ports_____________.
16,384–32,767
This field implies the maximum number of unacknowledged bytes that are allowed to be outstanding at any instant in time.
Window field (of a TCP header)
This is sometimes used to describe the error recovery and windowing
processes that TCP uses
Positive Acknowledgement and Retransmission (PAR)
This refers to the process of initializing sequence and
acknowledgment fields and agreeing on the port numbers used
Connection establishment (in TCP)
TCP signals connection establishment using ________ inside the flag fields of the TCP header. These are call the ________ and _________.
2 bits; SYN and ACK flags
What does the SYN flag means?
Synchronize the sequence numbers
What does the ACK Flag mean?
The Acknowledgment field is valid in this
header
TCP initializes the Sequence Number and Acknowledgment Number fields to any number
that fits into the ______ fields
4-byte
The TCP four-way termination sequence is straightforward and uses an additional flag, called the ______ bit.
FIN (short for finished)
A protocol that requires an exchange of messages before data transfer begins or that has a required preestablished correlation between two endpoints.
Connection-oriented protocol
A protocol that does not require an exchange of messages and that does not require a preestablished correlation between two endpoints.
Connectionless protocol
This is the size of the largest Layer 3 packet that can sit inside a frame’s data field.
Maximum Transmission Unit (MTU)
Because an IP packet can often be no more than 1500 bytes because of the MTU restrictions, and because IP and TCP headers are 20 bytes each, TCP typically segments large data into ________ chunks.
1460-byte
An attack whose purpose is to break things.
Denial of Service (DoS) attacks
DoS attacks called __________ try to harm the hosts, erasing data and software.
destroyers
DoS attacks
called ____________ cause harm by causing hosts to fail or causing the machine to no longer be able to connect to the network.
crashers
DoS attacks called ____________ overwelm the network with packets to make the network unusable, preventing any useful communications with the servers.
flooders
This kind of attack may be disruptive as a side effect, but its goal is gathering information to perform an access attack. An example is learning IP addresses and then trying to discover servers that do not appear to require encryption to connect to the server.
Reconnaissance attacks
An attempt to steal data, typically data for some financial advantage, for a competitive advantage with another company, or even for international espionage.
Access attacks
What port number that https use?
TCP Port 443
These switching methods allow the switch to start forwarding the frame before the entire frame has been
received, reducing time required to send the frame (the latency, or delay).
cut-through and fragment-free processing
Name the switching method whereby the switch fully receives all bits in the frame before forwarding the frame. This allows the switch to
check the FCS before forwarding the frame.
Store-and-forward
The switch forwards the frame as soon as it can. This reduces latency but does not allow the switch to discard
frames that fail the FCS check.
Cut-through
The switch forwards the frame after receiving the first 64
bytes of the frame, thereby avoiding forwarding frames that
were errored due to a collision.
Fragment-free
This stores the working memory and
running configuration
RAM
This stores the Cisco IOS Software
Flash
This stores the Bootstrap Program
ROM
This stores the Startup Configuration
NVRAM
What are the two main Cisco IOS Configuration files?
Start-up config and Running-config
Name the four types of Cisco switch memory:
RAM, ROM, Flash, NVRAM
This stores the initial configuration used any time the switch reloads the Cisco IOS.
Startup config
This stores the currently used configuration commands. This file changes dynamically when someone enters commands in configuration mode.
Running-config