• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/136

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

136 Cards in this Set

  • Front
  • Back
What are some characteristics of Transmission Control Protocol (TCP)?
-Reliable
-Guaranteed Delivery
-Connection-Oriented
-Windowing
+Error DETECTION via
-Sequence number
-ACK number
What are some characteristics of User Datagram Protocol (UDP) ?
- Best Effort delivery
- No Error Detection
- No Windowing
- Connectionless
What are 3 things that TCP and UDP headers have in common?
-Source Ports
-Destination Ports
-Checksum
Why would someone choose to use UDP over TCP?
Less Overhead. Header is smaller on UDP than TCP. Header is attached to each segment being transferred.
What is the purpose of Flow Control and what are the 3 types?
...provide a means for the receiver to govern the amount of data sent by the sender.
1)Buffering
2)Windowing
3)Congestion Avoidance
What 2 characteristics are most critical when implementing streaming video services?
1) Bandwidth
2) Latency
What protocol is used to provide information about network problems?
ICMP
Encapsulated within IP DATAGRAMS
2 common uses of ICMP are
1)Ping
2)Traceroute
What is ARP used for?
ARP (Address Resolution Protocol) is used to resolve an IP address (Layer 3) to a MAC address (Layer 2)
What is the purpose of DNS?
The TCP/IP stack must find an IP Address for packets destined for a URL
What is the purpose of DHCP?
...a network device will automatically assign IP addresses to workstations.
What is the command to properly configure Telnet access for 3 VTY lines and encrypt both the Enable and TELNET passwords?
enable password xxx
service password-encryption
line vty 0 2
password xxx
login
What type of encryption is used with WPA2 ?
AES
What layer of the OSI model are SEGMENTS found at?
TRANSPORT LAYER
What layer of the OSI model are PACKETS found at?
NETWORK LAYER
What layer of the OSI model are FRAMES found at?
DATA LINK LAYER
What troubleshooting command will display PC network configuration?
ipconfig /all
What troubleshooting command will display the list of routers on a path to the destination?
tracert
What troubleshooting command will test VTY configuration?
telnet
What troubleshooting command will test TCP/IP protocol stack?
ping 127.0.0.1
What troubleshooting command will displays IP to MAC address mappings?
arp -a
If you cannot reach any sites on the Internet, but other users can, what should you check?
You should check to make sure you can reach your DNS server.
True or False
Switches allow simultaneous frame transmissions?
True
Switches allow simultaneous frame transmissions
What can switches filter frames on?
MAC Addresses when using port security
What can you do to prevent unauthorized hosts from using the LAN?
Use PORT SECURITY
What happens if a SWITCH receives a MAC address that is not on its MAC address table?
The frame goes out all ports EXCEPT the one it came in on.
What do switches build and maintain that aid in routing?
a MAC address table
What is Store and Forward?
And what are its pros and cons?
A switching method that copies and analyzes (runs Frame check seq) before forwarding the frame on..
This method takes longer (+latency)
Error Free (filters ALL frame errors)
What is Cut-Through?
Switching method that checks the destination address
What is Fragment-free?
Switching method that copies 1st 64 bytes
What does Spanning Tree protocol do?
802.1D
Prevents frames from duplicating and looping continuously through network by blocking redundant paths
What are 3 things that can cause wireless performance issues?
1) Metal file cabinets
2)Cordless phones
3) antenna type/direction
Some facts about WEP
Wired Equivalence Privacy
Considered Weak
Static
Uses Pre-Shared Key
Some facts about WPA
Wi-Fi Protected Access
Uses Pre-Shared Key (PSK) and Temporal Key Integrity Protocol (TKIP)
Dynamic Encryption Keys
Keys Change Automatically
Some facts about WPA2
Wi-Fi Protected Access #2
uses AES/CCMP
Stronger than WEP and WPA
When you see the Wi-Fi Logo on an Access Point or Client Adaptor it means what?
1)The Wi-Fi Alliance has tested the device and determined that it meets IEEE WLAN std's
2) the device can inter-operate with other devices using the same standard.
What is the recommended percentage of overlap of signals from AP's in ESS?
15%-20%
Name 3 of the BEST PRACTICES for securing a network.
1) Comprehensive Security Plan defining how to PHYSICALLY secure network equipment
2) Use of FIREWALL to restrict access from the outside -> in
3) Use SSH or other ENCRYPTED and AUTHENTICATED transport to access device config's.
What does the USER EXEC prompt look like and what is it used for?
-Router>
-Used for monitoring router with "show" commands
What does the PRIVILEDGED EXEC prompt look like and what is it used for?
-Router#
-Gives full access to all commands
What does the GLOBAL CONFIG prompt look like and what is it used for?
-Router(config)#
-Used to configure the router globally
- i.e. settings, name of router, etc..
What does the INTERFACE CONFIGURATION prompt look like and what is it used for?
-Router(config-if)#
-Commands that affect the interface
- i.e. setting an IP address
What does the LINE CONFIGURATION prompt look like and what is it used for?
-Router(config-line)#
-Used for configuring the CONSOLE or VTY lines
- i.e. configuring passwords for remote access.
What is RAM memory and what does it store?
-Random Access Memory (RAM)
-Stores Running-Config
Running-IOS
ARP Table
What is FLASH memory and what does it store?
-Stores IOS images
What is NVRAM memory and what does it store?
-Non-Volatile Random Access Memory (NVRAM)
-STARTUP-CONFIGURATION
What is ROM and what does it store?
-READ ONLY MEMORY (ROM)
-Basic microcode
-Power On Self Test (POST)
-RxBoot
*and*
-ROM monitor (ROMMON) which is limited to OS for troubleshooting.
Where is the Configuration Register stored?
-Configuration Register is stored in NVRAM
What are 2 ways to control the boot process of a router?
1) CONFIGURATION REGISTER
2) BOOT SYSTEM COMMANDS**

**more common method
What is altered that determines how the router will boot up?
The last HEXADECIMAL VALUE of the CONFIGURATION REGISTER is altered thereby determining how the router will boot up.
What are some of the alternative boot cycles defined by the Configuration Register?
- 0x2102 =>Default
- 0x2100 =>ROMMON
- 0x2101 =>RxBoot
- 0x2102 =>Normal Bootup process.
- 0x2142 =>**PASSWORD RECOVERY!! This value tells router NOT TO LOAD startup config.
What information does the output from the command SHOW VERSION display?
-running IOS VERSION
-running IOS LOCATION & FILENAME
-total RAM on device
-equipped INTERFACES
-TOTAL FLASH
-CONFIGURATION REGISTER value
Routing occurs at what layer of the TCP/IP model?
INTERNET LAYER of TCP/IP model is responsible for ROUTING
When dealing with SWITCHES; what does it mean when you see (notconnect) in a SHOW INTERFACE output?
(notconnect) means that the PC's NIC port and the SWITCH's port are configured with DIFFERENT DUPLEX SETTINGS.

i.e. one is FULL DUPLEX and the other is HALF DUPLEX
Why would you use a DEFAULT ROUTE?
When you need to forward traffic to a network that is not listed in the routing table.
CDP is found at what layer of the OSI model?
CDP is found at the DATA LINK LAYER of the OSI model
What command do you use to find out if CLOCKING is stopped on an interface?
SHOW CONTROLLERS
What are the 4 parts to the DHCP process?
-DHCPDISCOVER
-DHCPOFFER
-DHCPREQUEST
-DHCPACK
What is the point of Private Addressing?
Private addressing:
1)a scheme to conserve public addresses
2)are addresses that cannot be routed through the public internet
What are the Private Addresses?
Class A: 10.0.0.0 - 10.255.255.255
Class B: 172.16.0.0 - 172.31.255.255
Class C: 192.168.0.0-192.168.255.255
What is the IP Subnet Zero rule?
When IP Subnet Zero rule is ENABLED be sure to ADD +2 to the number of networks for both rows B NETWORKS and C NETWORKS.
What is the purpose of Network Address Translation (NAT)?
-Hide Internal Addresses
-Preserve Public Addresses
What layer(s) of the OSI model make up the APPLICATION Layer of the TCP/IP model ?
1)Application
2)Presentation
3)Session
What Layer(s) of the OSI model make up the TRANSPORT layer of the TCP/IP model?
Transport
What layer(s) of the OSI model make up the INTERNET layer of the TCP/IP model?
NETWORK
What layer(s) of the OSI model make up the NETWORK ACCESS layer of the TCP/IP model?
1) DATA LINK
2) PHYSICAL
What is the ADMIN. DISTANCE of a Connected device?
ADMIN. DISTANCE = 0
What is the ADMIN DISTANCE of STATIC
ADMIN. DISTANCE = 1
What is the ADMIN DISTANCE of BGP
ADMIN. DISTANCE = 20
What is the ADMIN DISTANCE of EIGRP
ADMIN. DISTANCE = 90
What is the ADMIN DISTANCE of IGRP
ADMIN. DISTANCE = 100
What is the ADMIN DISTANCE of OSPF
ADMIN. DISTANCE = 110
What is the ADMIN DISTANCE of IS-IS
ADMIN. DISTANCE = 115
What is the ADMIN DISTANCE of RIP
ADMIN. DISTANCE = 120
What is the ADMIN DISTANCE of EIGRP (ext)
ADMIN. DISTANCE = 170
What is the ADMIN DISTANCE of BGP?
ADMIN. DISTANCE = 200
What are 4 Loop Prevention measures?
1)Split Horizon
2)Hold-Down Timer
3)Triggered Update
4)Poison Reverse
What is Split Horizon?
Split Horizon-is a method of preventing routing loops in distance-vector routing protocols by prohibiting a router from advertising a route back onto the interface from which it was learned.
What is a Hold-Down Timer?
a hold-down keeps a router from receiving route until the network appears to be stable -- until either an interface stops changing state (flapping) or a better route is learned.
What is a Triggered Update?
Triggered updates are used to prevent loops by exchanging routing information whenever there is change
What is Poison Reverse?
[answer]
What is Data Terminal Equipment (DTE)
-e.g. Routers
-normally located at the company buying the FRAME RELAY service.
What is Data Communications Equipment (DCE)?
-e.g. Frame Relay Switches
-normally in the ISP network
-provides clocking
What is a Virtual Circuit?
A Virtual Circuit defines a logical path between two Frame Relay DTE's
What is a Permanent Virtual Circuit?
A PVC is essentially a leased line accessible any time its needed.
What is a Switched Virtual Circuit?
A SVC is essentially a dial up connection
What is a Local Management Interface? (LMI)
is a signaling standard used between routers and frame relay switches. Communication takes place between a router and the first frame relay switch it's connected to. Information about keepalives, global addressing, IP Multicast and the status of virtual circuits is commonly exchanged using LMI.
What are the 3 standards of LMI?
1)Cisco
2)ANSI
3)Q933a

*DTE & DCE MUST USE SAME LMI
What keep a Frame Relay "alive"
LMI messages act as KEEPALIVES for a Frame Relay
What is a DLCI?
A DLCI is a Layer 2 Frame Relay address
What are 2 types of WAN data link encapsulation types (esp serial) ?
1) HDLC (Cisco Proprietary serial int)
2) PPP (open std, works with any vendor)
What encapsulation should be used on a WAN serial connection if equipment is from different vendors?
PPP encapsulation
What is required for a point-to-point link to work?
Both ends of the link MUST BE SAME ENCAPSULATION.
What are some PPP features that HDLC does NOT have?
1) Authentication using PAP/CHAP
2) Compression
3) Callback
4) Error Detection
5) Multi-link
6) Multi-protocol encaps
What is the difference between PAP and CHAP?
PAP = Cleartext
CHAP = Hash
What does LCP do?
handles the configuration, maintenance and teardown of any PPP connection. (including PPP callback, PAP, CHAP authentication, PPP Multilink, and error detection/correction, are all negotiated and handled by LCP)
What is it called when you have multiple private IP's mapped to a single registered public IP using different ports?
NAT Overload
How do you get multiple internal hosts to use one IP address to access external resources?
NAT Overload
When do you implement a Default Route?
A default route is used when a packet is destined for a remote network that is not listed in the routing table.
List 3 facts and 1 example of Distance Vector.
Facts:
1) Simple
2) Doesn't see entire topology; requires mechanisms to prevent loops.
3) Sends periodic broadcasts of routing table.

Example:
-RIP
List 3 facts and 2 examples of Link State.
Facts:
1) Hierarchical
2) Sees entire topology
3) Uses "hello" messages to determine neighbors and only sends out changes about specific routes when there is a change.

Example:
- OSPF
- IS-IS
what are the 6 metrics of EIGRP?
-Hops
-Load
-Bandwidth
-Reliability
-Delay
-MTU
Which is faster Distance Vector or Link State?
Link state protocols converge faster than distance vector protocols because routes can be flooded to
neighbors without having to run the routing algorithm
What is RIPv1 max hop count?
15 max hop count, 16 is unreachable.
How often do RIPv1 routers broadcast their entire routing table?
Routers broadcast their entire table to the link-local broadcast address of 255.255.255.255 every 30
seconds
How do RIPv1 routers gather routes from its neighbors?
Upon initialization, RIP routers issue requests for routes from neighbors
What does RIPv2 have that RIPv1 doesn't?
RIPv2 (defined in RFC 1723) expands on its predecessor to support:
Classless routing
Authentication
Next hop addresses
External route tags
Multicast advertisements (to 224.0.0.9) instead of broadcasts
Can RIPv2 communicate to RIPv1?
RIPv2 can be run in compatibility mode, broadcasting advertisements to ensure backward compatibility
with RIPv1.
What are the different EIGRP packet types?
Hello - Peer discovery and maintenance
Acknowledgment - Empty hello packets used to acknowledge messages
Update - Convey route information
Query - Request for a route
Reply - Answer to a query
What does EIGRP consider by default?
EIGRP can consider bandwidth, delay, reliability, and load in calculating a metric;

only bandwidth and delay are considered by default.
What kind of authentication does EIGRP support?
EIGRP only supports MD5 authentication,
What is PORT ADDRESS TRANSLATION (PAT)?
Port Address Translation (PAT), or NAT overloading, maps multiple internal hosts to a single outside
address using layer 4 port numbers.
What are the 4 steps of a routers start up process?
1. Test Hardware (POST)
2. Load bootstrap program
3. Locate and load Cisco IOS
4. Locate and Load the router configuration file
Where is the POST stored?
ROM
What are the 2 ways to revert back to the startup-config?
1) Reboot the router manually
2) Restart the router with the "reload" command.
What are 5 ways to test a connection?
-Telnet
-Ping
-Trace
-Show ip route
-Show interfaces
Name the 4 ways a router can be accessed for configuration.
- Console (CON)
- Auxiliary (AUX)
- Virtual Terminals (VTY)
- TFTP Server
What are the 5 passwords you can set in the Cisco IOS?
- Enable Password
- Enable Secret
- Console
- AUX
- VTY
What is the encrypted algorithm of "enable secret"?
MD5
Describe ROM
- Loads bootstrap program that initializes the router's basic hardware components.

contains:
Basic Microcode
Power on Self Test (POST)
RxBoot and ROM monitor aka (ROMMON)
-limited OS to use for troubleshooting
What is the purpose for FLASH Memory?
- Flash contains STORED IOS images.
What does NVRAM do?
- Stores Startup-Config
Describe RAM
- Contains the Running configuration
What does ESS stand for and what does it allow for when implemented?
Extended Service Set
- Allows roaming due to multiple access points
BSS within Wireless
- Basic Service Set
- Single AP available
WEP
RC4
What are the 4 layers of TCP/IP
1 - Network Interface
2 - Internetwork
3 - Transport
4 - Application
what are the 3 layers of the Cisco Three-Layer Hierarchical Model?
Access Layer
Distribution Layer
Core Layer
What 4 things can an EXTENDED ACL filter on?
1. Source IP Address
2. Destination IP Address
3. TCP or UDP port number
4. Protocol
What do standard ACL's filter on?
-SOURCE IP ADDRESS
-Entire Protocol Suite
Where should a standard ACL be placed?
Closest to the destination
Where should an extended ACL be placed
As close to the source as possible
What is used when the router is unable to match a destination network with an entry in its routing table?
Default Route
What is a manually configured route called?
Static Route
What address never changes no matter how many hops a packet takes?
Source and Destination IP Address
What address changes at each hop or router?
MAC Address
What is the function of a router?
To determine the best path from a source to a destination