• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/150

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

150 Cards in this Set

  • Front
  • Back

3 Steps a computer takes to communicate with another computer on the network. (Hint: Not necessarily the 3 way handshake).

1. Name resolution. IP address discovery.
2. Resolve IP address to MAC address.
3. Now ready to start communicating.
What is a primary purpose of the Routing Protocols
Build a map of the inner network.
Define a Collision Domain and the reason they are implemented.
A network segment with multiple hosts in which they all share the same bandwidth.
If two hosts on the same domain transmit at the same time then a collision occurs.
Define a Broadcast Domain and what creates them.
It is the boundary in which all devices see and participate in broadcasts sent from hosts and servers.
Broadcast Domains are created by routers.
What is a hub?
A "repeater" that takes a digital signal and sends it out every port (also refreshes signals).
Has 1 collision domain and 1 broadcast domain.
What is the purpose of a Bridge?
Break up collision domains on every port. (Creates more collision domains within a broadcast domain to avoid data collisions)
Include software that learns MAC addresses to more efficiently transfer data.
Have been replaced by switches.
What are Switches?
Multi-port Bridges.
Each port separates a collision domain.
Integrated the software that a bridge uses to learn MAC addresses into hardware to go through it's processes more quickly.
Logical addressing to filter the flow of data.
What do Routers do?
Stops broadcasts from transmitting through to other networks.
Use logical addressing.
Break up collision domains on each interface.
What is the Application layer (OSI Model) in charge of?
Makes sure connections can be made and that there are sufficient resources available.
File, print, message, database, and application services.
What is the Presentation layer (OSI Model) in charge of?
Data translation.
Presents the data in a format that can be understood by all devices.
What is the Session layer (OSI Model) in charge of?
Encapsulation is called Data at this layer.
Dialog control.
Maintains, tracks, and closes sessions between applications. Makes sure that the correct info is sent to the correct query.
What is the Transportation layer (OSI Model) in charge of?
Encapsulation is called a Segment at this layer.
End to end communication.
Multiplexes upper-layer applications.
Manages sessions, tears down virtual circuits, flow control, and data integrity.
What is the Network layer (OSI Model) in charge of?
Encapsulation is called a Packet at this layer.
Routing.
Transports data from one network to another by using routing tables and other methods.
What is the Data Link layer (OSI Model) in charge of?
Encapsulation is called a Frame at this layer.
Broken up into two sublayers, the LLC and the MAC layers.
LLC = Logical Link Control - Error control, flow control, and framing.
MAC = Media Access Control - Gives the data access depending on their MAC address.
What is the Physical layer (OSI Model) in charge of?
Encapsulation is converted into Bits at this layer.
The messenger, in charge of getting the information from one place to another. It is just electrical signals of 1's and 0's at this point.
Define the Application layer (TCP/IP Model).
Combines the top 3 layers of the OSI model into one (Application, Presentation, and Session).
Defines application protocols and how host programs interface with transport layer services to use the networks.
Define the Transport layer (TCP/IP Model).
Provides communication session management between host computers. Chooses TCP (safe and connection oriented) or UDP (best-effort and connectionless).
Define the Internet layer (TCP/IP Model).
Routes IP datagrams.
Internet Protocols (IP)
Address Resolution Protocol (ARP)
Internet Control Message Protocol (ICMP)
Define the Physical layer (TCP/IP Model).
Controls the hardware devices and media that make up the network.
Address Resolution Protocol (ARP)
A broadcast sent out over the network when one device is searching for another device within its broadcast domain.
Internet Control Message Protocol (ICMP)
It is in charge of error reporting. It is the protocol that the network uses to alert the network administrator that there is a problem on the network.
When subnetting " /25 " tells you what?
You will have the following:
1 bit on/ 7 bits off: 10000000
Subnet mask: 255.255.255.128
Increments/Block size: 128
Subnets: 2
Hosts per subnet: 126
When subnetting " /26 " tells you what?
You will have the following:
2 bit on/ 6 bits off: 11000000
Subnet mask: 255.255.255.192
Increments/Block size: 64
Subnets: 4
Hosts per subnet: 62
When subnetting " /27 " tells you what?
You will have the following:
3 bit on/ 5 bits off: 11100000
Subnet mask: 255.255.255.224
Increments/Block size: 32
Subnets: 8
Hosts per subnet: 30
When subnetting " /28 " tells you what?
You will have the following:
4 bit on/ 4 bits off: 11110000
Subnet mask: 255.255.255.240
Increments/Block size: 16
Subnets: 16
Hosts per subnet: 14
When subnetting " /29 " tells you what?
You will have the following:
5 bit on/ 3 bits off: 11111000
Subnet mask: 255.255.255.248
Increments/Block size: 8
Subnets: 32
Hosts per subnet: 6
When subnetting " /30 " tells you what?
You will have the following:
6 bit on/ 2 bits off: 11111100
Subnet mask: 255.255.255.252
Increments/Block size: 4
Subnets: 64
Hosts per subnet: 2
When subnetting " /31 " tells you what?
You will have the following:
7 bit on/ 1 bits off: 11111110
Subnet mask: 255.255.255.254
Increments/Block size: 2
Subnets: 128
Hosts per subnet: 0
Not a viable network.
When subnetting " /32 " tells you what?
You will have the following:
8 bit on/ 0 bits off: 11111111
Subnet mask: 255.255.255.255
Increments/Block size: 1
Not a viable network.
What is a MTU?
Maximum Transmission Unit - The most amount of information able to be sent at once.
What does TCP refer to?
A reliable connection, sets up a virtual circuit.
More network overhead since the two devices "chat" more.
Uses Syn(chronize) and Ack(nowledgements) to make sure all data is sent/received.
What does the Transport layer use to separate data?
Port numbers.
What does the Network layer use to separate data?
IP addresses
Define Flow Control.
It can occur at the transport layer and is a mechanism for the receiver to control the transmission speed.
Common types of Flow Control
Buffers - When full, some info will be dropped.
Source - Quench messages (stop and go)
Congestion avoidance - Random early detection.
Windowing (TCP) - Find exactly how much data the receiving host can accept before overloaded.
Define TFTP.
Trivial File Transfer Protocol
Operates on the application layer
(UDP file transfer at the transport layer)
Define FTP.
File Transfer Protocol
Application layer protocol
(TCP file transfer at the transport layer)
Define NFS.
Network File Service
Application layer protocol
(TCP file directory system)
Define SMTP.
Simple Mail Transfer Protocol.
Application layer protocol.
(TCP)
Define Telnet.
Runs programs on a remote host but does not transfer files. Makes your box a dumb terminal.
Application layer protocol.
Define rlogin.
Remote Login
Application layer protocol
Define SNMP.
Simple Network Management Protocol
Application layer protocol
(By default uses UDP - Newer versions can use TCP)
Define DNS.
Domain Name Service
Application layer protocol
(Resolves domain names for the internet - uses UDP - uses TCP between servers for updates)
Define DHCP.
Dynamic Host Configuration Protocols
Runs on top of Bootp (Bootp version 2).
Uses UDP
This is how a host can get an address on a network automatically.
Define the DHCP process. As per CCNA Objectives. (Hint: They are not all broadcasts)
Host --Broadcast--> Server
Discover message
"Who is out there?"
Server --Unicast--> Host
Offer message
"You are unknown, here are some credentials and [ip address] to access the network."
Host --Broadcast--> Server
Request message
"I like that info, can I associate myself with it?"
Server --Unicast--> Host
Acknowledgement message
"Ok, you are now known as [ip address] while on this network."
Define TCP.
Transmission Control Protocol
Connection-oriented service
Uses virtual circuits (Three-way handshake)
Enables windowing to find the optimum amount of packets that can be sent at a time.
Uses Sync/Ack.
Considered reliable.
Define UDP.
User Diagram Protocol
Simple connectionless service
No windowing, sequencing, or acknowledgements resulting in less overhead traffic.
Explain Windowing.
Uses Syn and Ack to manage data being sent. The sender tests the receiving host by sending more and more until packets begin to be dropped to find the optimum amount.
For example:
HostA --1 syn--> HostB (Sending 1)
HostA <--2 ack-- HostB (Ready for 2)
HostA --3 syn--> HostB (Sending 2 and 3)
HostA <--4 ack-- HostB (Ready for 4)
HostA --7 syn--> HostB (Sending 4, 5, 6, 7)
HostA <--7 ack-- HostB (Ready for 7 [7 dropped the first time])
HostA --9 syn--> HostB (Sent 7-9, only 3 this time since it's the max)
What is the 3 way handshake?
Used to set up a TCP connection.
HostA --Synchronize--> HostB
HostA <---Sync/Ack---- HostB
HostA --Acknowledge-> HostB
Both parties are ready to start reliable connection.
What port does HTTP use?
Port 80
TCP connection
What port does Telnet use?
Port 23
TCP connection
What port does FTP use?
Port 21
TCP connection
What port does SMTP use?
Port 161
TCP connection
What port does HTTPS use?
Port 443
TCP connection
What port does TFTP use?
Port 69
UDP connection
What port does SNMP use?
Port 161
UDP connection
What port does DNS use?
Port 53
UDP and TCP connection
Define Internet Protocol (IP)
A connectionless service that provides net addressing and routing through an inter network.
Define RARP.
Reverse Address Resolution Protocol
"I know my ethernet address, what is my ip?"
What are some uses for the ICMP?
Can provide info on network problems.
Ping (packet internet groaper). ICMP echo requests and ICMP echo replies.
ICMP Packets: Encapsulated with IP datagrams.
Traceroute: TTL (time to live) timeout, ICMP error messages.
What does each bit mean in binary?

(For example: 10110010)
1's are the bits turned "on"
0's are the bits turned "off"
Each bit represents the following:
128 64 32 16 8 4 2 1
From left to right:
1:128 on / 0:64 off / 1:32 on / 1:16 on / 0:8 off / 0:4 off / 1:2 on / 0:1 off
Added up this example represents 178 in binary.
Explain Hexadecimal.

(For example: 10110010)
Similar to binary, instead, each octet is broken up into 2 sections.
8 4 2 1 8 4 2 1
1-9 are left as-is.
10-15 are a-f (caps insensitive)
8 4 2 1 8 4 2 1
1 0 1 1 0 0 1 0
11 2
B 2
10110010 = B2 in hex.
IP range for Class A addresses.
10.0.0.0 - Network address (all bits off)
10.0.0.1 - First valid host
10.255.255.254 - Last valid host
10.255.255.255 - Broadcast address (all bits on)
IP range for Class B addresses.
172.16.0.0 - Network address (all bits off)
172.16.0.1 - First valid host
172.16.255.254 - Last valid host
172.16.255.255 - Broadcast address (all bits on)
IP range for Class C addresses.
192.168.10.0 - Network address (all bits off)
192.168.10.1 - First valid host
192.168.10.254 - Last valid host
192.168.10.255 - Broadcast address (all bits on)
What does ip subnet-zero do and why is it important?
Allows the use of the first and last address ranges in the ip range.
Without:
192.168.10.16 - First network range
192.168.10.32 - Second network range
With:
192.168.10.0 - First network range
192.168.10.16 - Second network range
Same applies to the last ranges.
What does it mean when you see 0x2100?
Load ROM monitor mode.
What does it mean when you see 0x2101?
Load mini IOS from ROM.
What does it mean when you see 0x2102?
Load IOS from flash and config from NVRAM. Router looks in NVRAM for boot sequence.
What does it mean when you see 0x2142?
Load IOS from flash and do not load startup-config.
What is the difference between:
"enable secret ...."
and
"enable password ...."
Enable secret will automatically encrypt your password while enable password will leave it in plain text when you do "show running-config"
How do you encrypt all passwords at once?
Router(config)#service password-encryption
You only need it on to setup the passwords and then you can turn it off and the passwords would still be encrypted. (Just adds to networks traffic if left running).
To turn it off...
Router(config)#no service password-encryption
What is the default order for searching for the IOS?
1. Check config register.
2. Parses config for the boot system command.
3. Defaults to first file in flash memory.
4. Attempts to boot from network server.
5. Boot helper image.
6. ROMMON (ROM Monitor mode)
Define CDP.
Cisco Discover Protocol
A cisco proprietary program that is turned on by default, runs at layer 2, and is used to gather information on its neighboring cisco devices.
Why use SSH over Telnet?
Even though they essentially do the same thing, you want to setup SSH and deny Telnet because SSH automatically encrypts all data being sent while Telnet sends plain text and is open to security insecurity. (Lol, flawless victory!)
Routing Protocols
How the routers communicate with one another to determine the path of a packet through the network.
Routed Protocols
IP and IPv6 are used to send user data through the inter network.
Interior Gateway Protocols (IGP)
Protocols such as RIP, IGRP, EIGRP, and OSPF used within an autonomous system.
External Gateway Protocols (EGP)
Protocols used to connect autonomous systems, BGP (Border Gateway Protocols) is the standard.
Autonomous System
Collection of networks under a common administrative domain.
Classful Routing Protocols
Do not include the subnet mask with the route advertisement. All the subnet masks need to be the same.
RIP and IGRP
Classless Routing Protocols
Include the subnet mask with the route advertisement. Supports Variable Length Subnet Masks (VLSM).
RIPv2, EIGRP, OSPF, and IS-IS
What is a Distance Vector routing protocol?
A routing protocol that periodically lets the rest of the network know about changes. Low network overhead.
RIPv1 and v2, IGRP, and EIGRP.
What is Link State routing protocol?
Each router is charged with creating a map of the network to calculate the best path to a destination. Considerably more network overhead than Distance Vector.
IS-IS
What does the Hybrid Routing Protocol refer to?
Cisco proprietary EIGRP, it is considered an advanced Distance Vector with some Link State routing protocol features.
How does RIP figure out the best path?
Hop count. 3 hops over 10 gigabyte lines will be seen as the same as 3 hops over a 56 kilobyte lines.
What does IGRP use to figure out the best path through a network?
Bandwidth, delay, load, reliability, and MTU.
Define Split Horizon.
The protocol implemented to avoid wrong information from a router sending and then receiving the same routing information on the same port.
Define Route Poisoning.
Often times due to redundant paths through a network causing routers to log bad paths to other networks.

Split Horizon - One method to prevent routing loops, it sends routing information about bad links that should be removed from routing tables.
Default Administrative Distances
Directly Connected: 0
Static Route: 1
RIP: 120
IGRP: 100
EIGRP: 90
OSPF: 110
Dis-contiguous addressing is what?
Two networks of the same classful network are separated by a different network address.

*NOTE: the command "no auto-summary" will fix that. Do not rely on that command for the CCNA exam.
What are some important points about OSPF?
Uses hello packets to create adjacency and maintain connectivity with neighbor routers.
Uses Multicast.
Hello packets and LSAs from other routers help build and maintain the topological database.
What is the Router ID (RID)?
The unique ID given to the router of an area.
It is used to properly arrange them in neighbor tables.
What is a Designated Router (DR)?
In an OSPF network, it is the router with the highest priority, elected by the other routers.
You want your best, most badass, router to be elected as the DR.
What is the Backup Designated Router (BDR)?
It is the backup to the DR in an OSPF configured network. It has the second highest priority.
[OSPF]
Define some specifics about Broadcast Multi-Access.
Must be full mesh, elects the DR and BDR, and uses multicast messages.
[OSPF]
Define some specifics about Non-Broadcast Multi-Access.
Must be full mesh, elects the DR and BDR, and uses unicast messaging.
[OSPF]
Define some specifics about Point-to-Point.
No DR or BDR is elected.
A good trick to force a OSPF reelection to switch the DR and BDR.
Raise the priority to 2 or 3 (default 1) on the DR and/or BDR and then disable the appropriate fastEthernet ports and then enable them.
Notes on configuring Wild Card masks.
Wildcards are always 1 less than the block size.
0.0.0.0 means that all the octets match exactly.
0.0.0.255 means the first three match exactly but the last octet can be any number.
Spanning Tree Protocol (STP)
Protocol to allow the ability to have redundant routes but to avoid Infinite Loops/Broadcast Storms by blocking all but one route.
Redundant Topology
Multiple routes through a network to help eliminate single points of failure. By itself causes broadcast storms, multiple frame copies, and MAC address table instability problems.
STP Operations
Designates a root bridge to funnel all traffic through. All other routers find the best path through to the root bridge for fastest convergence of the STP.
[STP]
What is a Root Port?
The port a router uses to get to the Root Bridge.
[STP]
What is the Designated Port?
This is the Root Bridge's designated port to send/receive traffic on.
[STP]
What is the Root Bridge?
Should be your most badass router, it is the one with the lowest Bridge ID and is in charge of funneling traffic through it.
[STP]
How is the Bridge ID found?
It is the Bridge Priority + Bridge MAC address.
Lowering the priority will usually make it the Root Bridge by itself.
What are the different states of the STP?
Blocking -> Listening -> Learning -> Forwarding (802.1d - Whole process takes about 50 seconds)

When all ports are either forwarding or blocking then all STP routes have converged.
[STP]
What is PortFast?
A command designed to make the STP go through its processes much quicker so you don't need to wait through the 50 seconds it takes to do its full sequence. 802.1w only take a few seconds to converge.
What is a VLAN?
Virtual Local Area Network
Broadcast domain
It can span across multiple switches by connecting them through their Trunked Links, in order to do this you need to assign memberships to specific ports.
(For example: VLAN 1 = Sales, sales reps can be all over the building but need to be on the same broadcast domain so you assign them to the same VLAN).
What does the Access Link do?
It carries information of only one VLAN.
Host to switch (connected with a straight-through cable).
What are Trunk Links?
These carry information about all/many VLANs.
Switch to switch (connected with a cross-over cable).
Hub to hub.
What is 802.1q?
Frame Tagging
What is 802.1x?
Port-based authentication.
This is key for bigger companies where security is very important.
Can you get more interfaces than just the physical ones?
Yes.
Each physical interface can be divided into virtual subinterfaces.
(For example:
FastEthernet0/0
Fa0/0.1
Fa0/0.2
Fa0/0.3
Not so good for companies, great for home use.)
Virtual Trunk Protocol (VTP)
Keeps the VLAN database synchronized between all switched in the internetwork by creating a "VLAN Domain."
Saved in RAM and is downloaded every time it's turned on from the VTP server.
When changes are made to the VTP server it is downloaded and the switches forward it out its ports.
What are the VTP modes?
Client: Accept then forward out.
Server: Host the list where changes are made.
Transparent: Do not accept the list just forward out the trunk links.
What is one of the most Common Attacks to your network?

Denial of Service (DoS)
Flood of packets that open sessions and do not close them, overwhelms your server and will eventually freeze it.

What are the two main Security Appliances for your network?
IDS - Intrusion Detection System
Detects multiple types of malicious behavior.
IPS - Intrusion Prevention System
Monitors the line for malicious packets and will deny the attacks while still letting the good traffic by.
Access Control List (ACL)
Allows or denies access to certain areas on a network based on permission.
(For example: Sales cannot access the IT network)
Standard ACL
Checks source address
Generally permits or denies entire protocol suites.
Extended ACL

Check the source and destination address.
Generally permits or denies specific protocols and applications.

True or False
Pudding tastes delicious.

(FUN CARD! Change of pace, you should take a break and stretch. Go grab a glass of water or a snack.)
Trick question!
You're right! (Assuming you answered based on whether you enjoy it or not).
It's preference.
True or False
"Buffalo buffalo Buffalo buffalo buffalo buffalo Buffalo buffalo" is a valid sentence.

(FUN CARD! Change of pace, you should take a break and stretch. Go grab a glass of water or a snack.)
True!
You've got to love the English language...
Look it up on wikipedia or search for it on google.
How can you easily identify an ACL?
Numbered Standard: 1-99, 1300-1999
Numbered Extended: 100-199, 2000-2699
Named (Std and Ext): Name
Local Address.
Address before translation.
Global Address.
Address after translation.
Inside Local
Inside source
IP address
Inside Global
Translated address
What it is on the internet (IP)
Outside Local/Global
Destination host...
I was told it is not really part of the CCNA objectives.
NAT and PAT
Network Address Translation
Port Address Translation (aka NAT overload)
Translates inside local addresses to inside global address, allowing them access to the internet.
NAT = 1 internet ip for 1 host.
PAT = 1 internet ip for many hosts.
PAT uses sockets.(IP address:Port)
Example...
UserA - 192.168.10.1:20
UserB - 192.168.10.1:21
(NOTE: Not sure if that is a valid internet address or if it's strictly a class C network address but it gets the points across).
Are wireless routers Half or Full-Duplex?
Half-Duplex: 802.11a, 802.11b, 802.11g
Full-Duplex: 802.11n
What are some things to consider when setting up a wireless network?
Interference: Microwaves, other routers (and what channels they are transmitting on), and physical barriers (concrete)
Reflection: Metallic surfaces.
Scattering: Signal hitting a lake will shoot off in all directions.
Absorption: Pine-needles and other trees will seriously reduce the strength of a signal. (Bigger problem for 2.4ghz frequency than for the 5ghz)
What are the three unlicensed Radio Frequencies that we can use?
900mhz
2.4ghz
5ghz
How many channels are considered "clean" on the 2.4ghz frequency?
Three, out of the 14 channels available, 1, 6, and 11 do not overlap with one another.
Time to use your imagination.
Imagine a circle around each number and that each number is a router using the appropriate channel, set up like this you will not need to worry about conflicting signals. (Within your network, a neighboring company or home router might be using a conflicting channel within range of your routers and you will need to either take that into account or ask them to change their channel. In both parties best interest.)
1 6 11 1 6 11
11 1 6 11 1 6
1 6 11 1 6 11
What is the Wi-Fi Alliance?
Global non-profit organization that certifies network devices for following an industry standard. This promotes growth and development within the industry since everyone's products work with everyone else's.
What is the IEEE?
Institute of Electrical and Electronic Engineers.
802.11 documentation
These guys invent all the cool stuff.
[802.11 Topology]
Ad Hoc Mode
Independent Basic Service Set (IBSS)
Mobile clients connect directly to one another without going through an access point.
HostA - - - - -HostB
[802.11 Topology]
Infrastructure Mode

Basic Service Set (BSS)
Mobile clients access one another and the network through a single access point.
HostA - - -Access Point- - - HostB

[802.11 Topology]
Extended Service Set
Two or more BSSs are connected by a common distribution system.
Switch
| |
HostA - - -AP AP- - - HostB
What is a Wireless Cell?
The area of coverage around the access point.
How big of an wireless cell overlap do you want when setting up your network?
10-15% overlap to not lose connectivity when you have roaming users.
What are the data rates for 802.11b around the access point?
11, 5.5, 2, 1mb/s DSSS (Direct Service Spread Spectrum)
The closest users get the fastest speed while on the outskirts you get only a fraction of the speed.
What encryption types do WPA and WPA2 use?
WPA - TKIP/MIC (Message Integrity Check)
WPA2 - AES-CCMP
AES: Advanced Encryption Scheme. A hardware encryption.
What are some of the benefits of using IPv6?
No need to use DHCP, NAT, or Subnet.
What does " :: " mean in an IPv6 address?
The octet(s) between those two semicolons are all zeros. This can only be used once in an address.
x:x:0:0:0:x:x:x = x:x::x:x:x
x:x:0:0:0:x:0:x = x:x::x:0:x
FE01:0:0:0:0:0:0:1 = FE01::1
Leading zeros are optional.
FE01:1 = 0:0:0:0:0:0:FE01:1
:: = 0:0:0:0:0:0:0:0
What does anycast mean?
One to nearest (from unicast address space)
More than one device shares the same address
All anycast nodes should provide uniform service
Source devices send packets to anycast address
Routers decide on closest device to get to the destination
Great for load balancing
What is a Hot Standby Routing Protocol (HSRP)?
When you have two default gateways setup in IPv4 one will sit on standby since you cannot have two default gateways, however in IPv6 it has been fixed so you can have multiple default gateways in one network.
What is the difference between IPv4's and IPv6's format?
IPv4 has 4 octets between 0 and 255 which limits the number of addresses that can be used, thankfully for NAT Overload we have been able to work around that problem.
While IPv4 only uses 4 octets, IPv6 uses 16. This gives us a phenomenal amount of variances to accommodate almost every electronic device in the world without overlap.
How does RIP choose the best path through a network?

With hop count.
3 jumps through 56k lines would be seen as the same as 3 jumps through 1 gigabyte lines.