Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
93 Cards in this Set
- Front
- Back
How do you prevent unauthorized hosts from accessing the LAN? |
Port Security
|
|
What layer of the OSI model would you find WINDOWING and SEQUENCE NUMBERS? |
Transport (Layer 4)
|
|
What device would you use to create more collision domains on your network? |
Switches and Bridges
|
|
What Windows command displays IP to MAC address mappings?
|
arp -a
|
|
What command tests VTY configuration?
|
telnet
|
|
What layer of the OSI model is responsible for end-to-end connections?
|
Transport (layer 4)
|
|
What layer of the OSI model is responsible for formatting your data?
|
Presentation (Layer 6)
|
|
What layer of the OSI model provides network services to HTTP/SMTP
|
Application (Layer 7)
|
|
What layer of the OSI model is responsible for managing sessions?
|
Session (Layer 5)
|
|
What is the sequence number in the TCP header responsible for?
|
Reassembly of the data into the correct order.
|
|
What is the purpose of Flow control?
|
Provide a means for the receiver to govern the amount of data sent by the sender.
|
|
What are 3 types of flow control?
|
1) Buffering
2) Windowing 3) Congestion Avoidance |
|
What are the two characteristics that are most critical when implementing streaming video services?
|
1) Bandwidth
2) Latency |
|
When do you use a DEFAULT ROUTE?
|
When a packet is destined for a remote network that is not listed in the routing table.
example: router(config)#ip route 0.0.0.0 0.0.0.0 serial0/0 or 10.0.0.1 |
|
What are two applications that can slow down your network?
|
1) PC-based VoIP services
2) Online video sites |
|
What are 3 things the network layer is responsible for?
|
1) IP addressing
2) Routing 3) ICMP |
|
What does ICMP stand for and what is an example of it?
|
Internet Message Control Protocol
Encapsulated within IP datagrams example #1 PING example #2 Traceroute |
|
What are 3 types of IP communication?
|
1) Unicast - One-to-One |
|
When you receive the message "TTL expired in transit" what does this generally mean?
|
You have a loop
|
|
What layer is responsible for getting your data to the physical medium?
|
Data Link (Layer 2)
|
|
What are 4 examples?
|
1) LAN - Ethernet |
|
What are the 5 steps to data encapsulation in TCP/IP?
|
1) Application has data to send
2) Encapsulate at Transport Layer (4) 3) Encapsulate at Network Layer (5), adding network address 4) Encapsulate at Data Link Layer (2) adding data link address 5) Transmit the bits at the Physical layer(1) |
|
1's in the subnet mask indicate what? 0's indicate what?
|
1's indicate Network portion
0's indicate Host portion |
|
What are the changes made to an RJ 45 cable to make it a crossover cable?
|
Pin 1 is crossed over to Pin 3
Pin 2 is crossed over to Pin 6 |
|
What are the 5 states of 802.1d?
(Spanning Tree Protocol) |
1)Blocking
2)Listening 3)Learning 4)Forwarding 5)Disabled |
|
Which 2 states of STP learn MAC addresses?
|
1)Learning
2)Forwarding |
|
What is the default Bridge Priority value assigned to switches?
|
32768
|
|
What is a Bridge ID?
|
MAC Address
|
|
How long does it take a switch to go from Listening to Learning?
|
50 seconds
|
|
What is another name for the 50 seconds a switch takes to go from Listening to Learning?
|
Forward Delay
|
|
When does Convergence occur?
|
when switches have transitioned to either FORWARDING or BLOCKING states.
|
|
During Convergence what is forwarded?
|
nothing is forwarded during convergence
|
|
True or False
Blocked Ports do not receive BPDU's |
False
Blocked ports still receive BPDU's |
|
When do you use a DEFAULT ROUTE?
|
When a packet is destined for a remote network that is not listed in the routing table.
example: router(config)#ip route 0.0.0.0 0.0.0.0 serial0/0 or 10.0.0.1 |
|
BPDU's send confirmation messages using what?
|
Multicast Frames
|
|
How many instances of Spanning Tree can Bridges have?
|
Bridges can have ONLY 1 instance of Spanning Tree
|
|
How many instances of Spanning Tree can Switches have?
|
Switches can have MANY instances of Spanning Tree
|
|
What is the Spanning Tree Algorithm used for?
|
Spanning Tree Algorithm (STA) is used to calculate a loop-free path
|
|
All switch ports are set to what STP state to begin with?
|
Blocking mode
|
|
True or False
STP allows redundant links? |
True
|
|
What determines who gets title ROOT BRIDGE?
|
Lowest Bridge Priority
=======if tie======== Switch w/ lowest Bridge ID=MAC address |
|
What determines who gets title ROOT PORT?
|
cumulative cost back to the root bridge
cost = inverse of bandwidth for each link segment. Ports directly connected to Root Bridge will be ROOT PORTS/if not directly connected than lowest ROOT path cost is used. |
|
What determines who gets title DESIGNATED PORT?
|
The single port that sends and receives traffic from switch to and from the ROOT BRIDGE
======or====== |
|
Standard Access Lists base criteria on what?
|
SOURCE ADDRESS only and the entire PROTOCOL SUITE
|
|
Where should a STANDARD ACL be applied?
|
STD ACL should be applied close to the DESTINATION and OUTBOUND
|
|
Where should an EXTENDED ACL be applied?
|
EXTENDED ACL should be applied close to SOURCE and INBOUND!
|
|
Where should a STANDARD ACL be applied?
|
STD ACL should be applied close to the DESTINATION and OUTBOUND
|
|
Where should an EXTENDED ACL be applied?
|
EXTENDED ACL should be applied close to SOURCE and INBOUND!
|
|
Where should a STANDARD ACL be applied?
|
STD ACL should be applied close to the DESTINATION and OUTBOUND
|
|
Where should an EXTENDED ACL be applied?
|
EXTENDED ACL should be applied close to SOURCE and INBOUND!
|
|
Where should a STANDARD ACL be applied?
|
STD ACL should be applied close to the DESTINATION and OUTBOUND
|
|
Where should an EXTENDED ACL be applied?
|
EXTENDED ACL should be applied close to SOURCE and INBOUND!
|
|
Where should a STANDARD ACL be applied?
|
STD ACL should be applied close to the DESTINATION and OUTBOUND
|
|
EXTENDED ACL's are based on what criteria?
|
1)SOURCE
2)DESTINATION 3)SPECIFIC PROTOCOL in a Suite |
|
What does a STD ACL command line look like?
|
Router(config)#access-list [ACL #] {permit|deny} {test conditions}
Router(config-if)#ip access-group access list # {in|out} |
|
How do you determine the Wildcard Mask for a subnet?
|
Increment - 1
example 1: 255.255.255.240 (/28)= 0.0.0.15 (increment is 16) example 2: 255.255.248.0 (/21)= 0.0.7.255 (increment is 8.0) |
|
What can EXTENDED ACCESS LISTs Filter on?
|
1) PROTOCOL
2) TCP/UDP port # 3) SOURCE and DESTINATION IP ADDRESS |
|
What does an EXTENDED ACL command line look like?
|
example:
Router(config)#access-list ACL# {perm|deny}[Protocol][Src w/ mask] [dest w/ mask] [operator operand] ACL# = 100-199 Protocol=TCP/UDP/ICMP Operator*= eq (equals) gt (greater than) lt (less than) * must be followed by TCP|UDP ports or ICMP echo or echo REPLY etc |
|
ACL's are used to classify network traffic for many uses...name 5
|
1)Packet Filtering
2)Quality of Service 3)Identifying INTERESTING traffic for DDR (Dial-on-demand routing) 4)IP Route Filtering 5)NAT |
|
ACL's are used to classify network traffic for many uses...name 5
|
1)Packet Filtering
2)Quality of Service 3)Identifying INTERESTING traffic for DDR (Dial-on-demand routing) 4)IP Route Filtering 5)NAT |
|
What is a Layer 3 (Network) device?
|
Routers - Routes on packets based on IP address
|
|
What are Layer 2 (Data Link) devices?
|
Switches
and Bridges both forward frames based on MAC addresses |
|
What is a Layer 1 device? (Physical Layer)
|
Hub
Repeats signal |
|
Presentation / layer 6
|
-data representation
-ensures the data is reachable by recieving systems -formats data -structures data -provides encryption -negotiates data transfer Above describes what layer on the osi model? |
|
Transport / layer 4
|
-end to end connections
-handles transportation issues between hosts -ensures data transport reliability -provides reliability through fault detection and recovery information flow control Above describes what layer of the osi model |
|
-Access to media
-Defines how data is formatted for transmission and how access to the network is controlled -provides error detection All these describe what layer of the OSI model |
Layer 2 / Data Link
|
|
Bits are on what layer of the OSI model?
|
Physical Layer / Layer 1
|
|
When a security violation occurs in the switch, what are the 3 valid modes that may occur?
|
protect, restrict, shutdown
|
|
Defines the electrical,mechanical,procedural,and functional specifications for activation,maintaining,and deactivating the physical link. This describes what layer of the osi model?
|
Physical
|
|
-Interhost communication
-establishes,manages,and terminates sessions between applications Above describes what layer of the osi model? |
Session / layer5
|
|
Frames are on what layer of the osi model?
|
data / layer 2
|
|
segments are on what layer of the osi model?
|
transport / layer 4
|
|
-data delivery
-routes data packets -selects best path to deliver data -provides logical addressing and path selection All these describe what layer of the osi model |
Network / layer 3
|
|
-data representation
-ensures the data is reachable by recieving systems -formats data -structures data -provides encryption -negotiates data transfer Above describes what layer on the osi model? |
Presentation / layer 6
|
|
-end to end connections
-handles transportation issues between hosts -ensures data transport reliability -provides reliability through fault detection and recovery information flow control Above describes what layer of the osi model |
Transport / layer 4
|
|
Frames are on what layer of the osi model?
|
data / layer 2
|
|
-Access to media
-Defines how data is formated for transmission and how access to the network is controlled -provides error detection All these describe what layer of the OSI model |
layer 2 / data link
|
|
packets are on what layer of the osi model?
|
network /layer 3
|
|
What are the three common values for the 4th Hex digit in the register?
|
The 4th Hex digit is typically set to "0, 1 or 2".
|
|
If the Boot Field (4th Hex digit) in the register is set to "2", what happen?
|
This causes the router to: 1)Try each "Boot System" command in the startup-config file until one works. 2)If none of the "Boot System" commands works, load the 1st IOS file found in Flash memory
|
|
If the Boot Field (4th Hex digit) in the register is set to "1", what happens?
|
This causes the router to load the 1st IOS file found in Flash memory.
|
|
What is the low-order 4 bits (4th Hex digit)in the register called?
|
The 4th Hex digit in the register is called the "Boot Field".
|
|
If the Boot Field (4th Hex digit) in the register is set to "0", what happens?
|
This causes the router to load the "ROMMOM OS" instead of IOS.
|
|
What is the result of segmenting a network with a bridge? (choose two)
a. It increases the number of collision domains b. It decreases the number of collision domains c. It increases the number of broadcast domains d. It decreases the number of broadcast domains e. It makes smaller collision domains f. It makes larger collision domains |
a. It increases the number of collision domains
e. It makes smaller collision domains |
|
Name some benefits of layering network protocol specifications.
|
1) Less complex
2) Standard Interfaces 3) Easier to learn 4) Easier to develop 5) Multi-vendor interoperability 6) Modular engineering |
|
Write out the 7 layers of the OSI model starting with Application. What format is data in at each level?
|
Application - Data
Presentation - Data Session - Data Transport - Segment Network - Packet Data Link - Frame Physical - Bits |
|
CSMA/CD steps when a collision is encountered...list them in order
|
4) Jam signal is sent by those stations that detected collision
5) All stations run back-off algorithm 6) When back-off delay period has expired...all stations have equal priority to transmit data. |
|
What are all six steps of CSMA/CD?
|
1) Stations wait until media is not in use before xmitting
2) Stations send their data 3) A collision occurs if two stations send data at the same time. 4) Jam signal is sent by those stations that detected collision 5) All stations run back-off algorithm 6) When back-off delay period has expired...all stations have equal priority to transmit data. |
|
Each port on a switch is what is in what....?
|
its own Collision Domain.
|
|
The implementation of Switches create what?
|
MORE COLLISION DOMAINS
|
|
What is a unique trait of Full Duplex Ethernet?
|
There are no collisions.
|
|
What is an ACCESS PORT?
(Trunking) |
-Carries traffic for a single VLAN
-Connects End-User Workstation to a Switch -Straight through cable connection |
|
What is a TRUNK PORT
(Trunking) |
-Carries traffic for multiple VLANs
-Facilitates Inter-VLAN communication when connected to a Layer 3 device -uses 802.1q to identify traffic from different VLANS |