• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/93

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

93 Cards in this Set

  • Front
  • Back
How do you prevent unauthorized hosts from accessing the LAN?
Port Security
What layer of the OSI model would you find WINDOWING and SEQUENCE NUMBERS?
Transport (Layer 4)
What device would you use to create more collision domains on your network?
Switches and Bridges
What Windows command displays IP to MAC address mappings?
arp -a
What command tests VTY configuration?
telnet
What layer of the OSI model is responsible for end-to-end connections?
Transport (layer 4)
What layer of the OSI model is responsible for formatting your data?
Presentation (Layer 6)
What layer of the OSI model provides network services to HTTP/SMTP
Application (Layer 7)
What layer of the OSI model is responsible for managing sessions?
Session (Layer 5)
What is the sequence number in the TCP header responsible for?
Reassembly of the data into the correct order.
What is the purpose of Flow control?
Provide a means for the receiver to govern the amount of data sent by the sender.
What are 3 types of flow control?
1) Buffering
2) Windowing
3) Congestion Avoidance
What are the two characteristics that are most critical when implementing streaming video services?
1) Bandwidth
2) Latency
When do you use a DEFAULT ROUTE?
When a packet is destined for a remote network that is not listed in the routing table.

example:
router(config)#ip route 0.0.0.0 0.0.0.0 serial0/0 or 10.0.0.1
What are two applications that can slow down your network?
1) PC-based VoIP services
2) Online video sites
What are 3 things the network layer is responsible for?
1) IP addressing
2) Routing
3) ICMP
What does ICMP stand for and what is an example of it?
Internet Message Control Protocol
Encapsulated within IP datagrams
example #1 PING
example #2 Traceroute
What are 3 types of IP communication?
1) Unicast - One-to-One
2) Multicast - One-to-Group
3) Broadcast - One-to-Everyone
When you receive the message "TTL expired in transit" what does this generally mean?
You have a loop
What layer is responsible for getting your data to the physical medium?
Data Link (Layer 2)
What are 4 examples?
1) LAN - Ethernet
2) WAN - Point-to-Point (PPP)
3) WAN - Frame Relay
4) WAN - High-Level Data Link Control
What are the 5 steps to data encapsulation in TCP/IP?
1) Application has data to send
2) Encapsulate at Transport Layer (4)
3) Encapsulate at Network Layer (5), adding network address
4) Encapsulate at Data Link Layer (2) adding data link address
5) Transmit the bits at the Physical layer(1)
1's in the subnet mask indicate what? 0's indicate what?
1's indicate Network portion
0's indicate Host portion
What are the changes made to an RJ 45 cable to make it a crossover cable?
Pin 1 is crossed over to Pin 3
Pin 2 is crossed over to Pin 6
What are the 5 states of 802.1d?
(Spanning Tree Protocol)
1)Blocking
2)Listening
3)Learning
4)Forwarding
5)Disabled
Which 2 states of STP learn MAC addresses?
1)Learning
2)Forwarding
What is the default Bridge Priority value assigned to switches?
32768
What is a Bridge ID?
MAC Address
How long does it take a switch to go from Listening to Learning?
50 seconds
What is another name for the 50 seconds a switch takes to go from Listening to Learning?
Forward Delay
When does Convergence occur?
when switches have transitioned to either FORWARDING or BLOCKING states.
During Convergence what is forwarded?
nothing is forwarded during convergence
True or False
Blocked Ports do not receive BPDU's
False
Blocked ports still receive BPDU's
When do you use a DEFAULT ROUTE?
When a packet is destined for a remote network that is not listed in the routing table.

example:
router(config)#ip route 0.0.0.0 0.0.0.0 serial0/0 or 10.0.0.1
BPDU's send confirmation messages using what?
Multicast Frames
How many instances of Spanning Tree can Bridges have?
Bridges can have ONLY 1 instance of Spanning Tree
How many instances of Spanning Tree can Switches have?
Switches can have MANY instances of Spanning Tree
What is the Spanning Tree Algorithm used for?
Spanning Tree Algorithm (STA) is used to calculate a loop-free path
All switch ports are set to what STP state to begin with?
Blocking mode
True or False
STP allows redundant links?
True
What determines who gets title ROOT BRIDGE?
Lowest Bridge Priority
=======if tie========
Switch w/ lowest Bridge ID=MAC address
What determines who gets title ROOT PORT?
cumulative cost back to the root bridge
cost = inverse of bandwidth for each link segment.
Ports directly connected to Root Bridge will be ROOT PORTS/if not directly connected than lowest ROOT path cost is used.
What determines who gets title DESIGNATED PORT?
The single port that sends and receives traffic from switch to and from the ROOT BRIDGE
======or======
Standard Access Lists base criteria on what?
SOURCE ADDRESS only and the entire PROTOCOL SUITE
Where should a STANDARD ACL be applied?
STD ACL should be applied close to the DESTINATION and OUTBOUND
Where should an EXTENDED ACL be applied?
EXTENDED ACL should be applied close to SOURCE and INBOUND!
Where should a STANDARD ACL be applied?
STD ACL should be applied close to the DESTINATION and OUTBOUND
Where should an EXTENDED ACL be applied?
EXTENDED ACL should be applied close to SOURCE and INBOUND!
Where should a STANDARD ACL be applied?
STD ACL should be applied close to the DESTINATION and OUTBOUND
Where should an EXTENDED ACL be applied?
EXTENDED ACL should be applied close to SOURCE and INBOUND!
Where should a STANDARD ACL be applied?
STD ACL should be applied close to the DESTINATION and OUTBOUND
Where should an EXTENDED ACL be applied?
EXTENDED ACL should be applied close to SOURCE and INBOUND!
Where should a STANDARD ACL be applied?
STD ACL should be applied close to the DESTINATION and OUTBOUND
EXTENDED ACL's are based on what criteria?
1)SOURCE
2)DESTINATION
3)SPECIFIC PROTOCOL in a Suite
What does a STD ACL command line look like?
Router(config)#access-list [ACL #] {permit|deny} {test conditions}
Router(config-if)#ip access-group access list # {in|out}
How do you determine the Wildcard Mask for a subnet?
Increment - 1

example 1:
255.255.255.240 (/28)= 0.0.0.15 (increment is 16)

example 2:
255.255.248.0 (/21)= 0.0.7.255 (increment is 8.0)
What can EXTENDED ACCESS LISTs Filter on?
1) PROTOCOL
2) TCP/UDP port #
3) SOURCE and DESTINATION IP ADDRESS
What does an EXTENDED ACL command line look like?
example:

Router(config)#access-list ACL# {perm|deny}[Protocol][Src w/ mask] [dest w/ mask] [operator operand]

ACL# = 100-199
Protocol=TCP/UDP/ICMP
Operator*= eq (equals)
gt (greater than)
lt (less than)
* must be followed by TCP|UDP ports or ICMP echo or echo REPLY etc
ACL's are used to classify network traffic for many uses...name 5
1)Packet Filtering
2)Quality of Service
3)Identifying INTERESTING traffic for DDR (Dial-on-demand routing)
4)IP Route Filtering
5)NAT
ACL's are used to classify network traffic for many uses...name 5
1)Packet Filtering
2)Quality of Service
3)Identifying INTERESTING traffic for DDR (Dial-on-demand routing)
4)IP Route Filtering
5)NAT
What is a Layer 3 (Network) device?
Routers - Routes on packets based on IP address
What are Layer 2 (Data Link) devices?
Switches
and
Bridges

both forward frames based on MAC addresses
What is a Layer 1 device? (Physical Layer)
Hub

Repeats signal
Presentation / layer 6
-data representation
-ensures the data is reachable by recieving systems
-formats data
-structures data
-provides encryption
-negotiates data transfer
Above describes what layer on the osi model?
Transport / layer 4
-end to end connections
-handles transportation issues between hosts
-ensures data transport reliability
-provides reliability through fault detection and recovery information flow control
Above describes what layer of the osi model
-Access to media
-Defines how data is formatted for transmission and how access to the network is controlled
-provides error detection
All these describe what layer of the OSI model
Layer 2 / Data Link
Bits are on what layer of the OSI model?
Physical Layer / Layer 1
When a security violation occurs in the switch, what are the 3 valid modes that may occur?
protect, restrict, shutdown
Defines the electrical,mechanical,procedural,and functional specifications for activation,maintaining,and deactivating the physical link. This describes what layer of the osi model?
Physical
-Interhost communication
-establishes,manages,and terminates sessions between applications
Above describes what layer of the osi model?
Session / layer5
Frames are on what layer of the osi model?
data / layer 2
segments are on what layer of the osi model?
transport / layer 4
-data delivery
-routes data packets
-selects best path to deliver data
-provides logical addressing and path selection
All these describe what layer of the osi model
Network / layer 3
-data representation
-ensures the data is reachable by recieving systems
-formats data
-structures data
-provides encryption
-negotiates data transfer
Above describes what layer on the osi model?
Presentation / layer 6
-end to end connections
-handles transportation issues between hosts
-ensures data transport reliability
-provides reliability through fault detection and recovery information flow control
Above describes what layer of the osi model
Transport / layer 4
Frames are on what layer of the osi model?
data / layer 2
-Access to media
-Defines how data is formated for transmission and how access to the network is controlled
-provides error detection
All these describe what layer of the OSI model
layer 2 / data link
packets are on what layer of the osi model?
network /layer 3
What are the three common values for the 4th Hex digit in the register?
The 4th Hex digit is typically set to "0, 1 or 2".
If the Boot Field (4th Hex digit) in the register is set to "2", what happen?
This causes the router to: 1)Try each "Boot System" command in the startup-config file until one works. 2)If none of the "Boot System" commands works, load the 1st IOS file found in Flash memory
If the Boot Field (4th Hex digit) in the register is set to "1", what happens?
This causes the router to load the 1st IOS file found in Flash memory.
What is the low-order 4 bits (4th Hex digit)in the register called?
The 4th Hex digit in the register is called the "Boot Field".
If the Boot Field (4th Hex digit) in the register is set to "0", what happens?
This causes the router to load the "ROMMOM OS" instead of IOS.
What is the result of segmenting a network with a bridge? (choose two)

a. It increases the number of collision domains

b. It decreases the number of collision domains

c. It increases the number of broadcast domains

d. It decreases the number of broadcast domains

e. It makes smaller collision domains

f. It makes larger collision domains
a. It increases the number of collision domains

e. It makes smaller collision domains
Name some benefits of layering network protocol specifications.
1) Less complex
2) Standard Interfaces
3) Easier to learn
4) Easier to develop
5) Multi-vendor interoperability
6) Modular engineering
Write out the 7 layers of the OSI model starting with Application. What format is data in at each level?
Application - Data

Presentation - Data

Session - Data

Transport - Segment

Network - Packet

Data Link - Frame

Physical - Bits
CSMA/CD steps when a collision is encountered...list them in order
4) Jam signal is sent by those stations that detected collision
5) All stations run back-off algorithm
6) When back-off delay period has expired...all stations have equal priority to transmit data.
What are all six steps of CSMA/CD?
1) Stations wait until media is not in use before xmitting
2) Stations send their data
3) A collision occurs if two stations send data at the same time.
4) Jam signal is sent by those stations that detected collision
5) All stations run back-off algorithm
6) When back-off delay period has expired...all stations have equal priority to transmit data.
Each port on a switch is what is in what....?
its own Collision Domain.
The implementation of Switches create what?
MORE COLLISION DOMAINS
What is a unique trait of Full Duplex Ethernet?
There are no collisions.
What is an ACCESS PORT?
(Trunking)
-Carries traffic for a single VLAN
-Connects End-User Workstation to a Switch
-Straight through cable connection
What is a TRUNK PORT
(Trunking)
-Carries traffic for multiple VLANs
-Facilitates Inter-VLAN communication when connected to a Layer 3 device
-uses 802.1q to identify traffic from different VLANS