• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/66

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

66 Cards in this Set

  • Front
  • Back
What is the purpose of the Spanning Tree Protocol (STP)?
STP actively monitors the network, searching for redundant links. If found, it shuts them down to prevent switching loops
What are the two most common functions of DNS?
(1) Resolve hostnames to IP addresses. (2) Perform IP address-to-hostname resolution (reverse lookup using pointer (PTR) records)
What is SNMP?
SNMP is a protocol that facilitates network management functionality. It enables network devices to communicate information about their state to a central system.
What is the IP range for the following Network Classes?
A
B
C
Class A = 1 – 126
Class B = 128 - 191
Class C = 192 – 223
True or False?
Subnetting increases the number of IP addresses available?
False – Subnetting does not increase the number of IP addresses available. It increases the number of network IDs.
List the private address ranges for Class A, B, and C addresses.
Class A = 10.0.0.0 – 10.255.255.255
Class B = 172.16.0.0 – 172.31.255.255
Class C = 192.168.0.0 – 192.168.255.255
What are the 7-layers of the OSI model
7. Application
6. Presentation
5. Session
4. Transport
3. Network
2. Data Link
1. Physical
What layer of the OSI model do the following operate?
A. IP
B. TCP
C. FTP
D. Flow Control
E. ARP
A. IP = Network Layer 3
B. TCP = Transport Layer 4
C. FTP = Application Layer 7
D. Flow Control = Transport Layer 4
E. ARP = Data Link Layer 2
What port do the following use?
A. FTP
B. SSH
C. Telnet
D. DNS
E. HTTPS
F. HTTP
G. NTP
H. RDP
I. POP3
J. IMAP4
K. SMTP
A. FTP = 20 & 21
B. SSH = 22
C. Telnet = 23
D. DNS = 53
E. HTTPS = 443
F. HTTP = 80
G. NTP = 123
H. RDP = 3389
I. POP3 = 110
J. IMAP4 = 143
K. SMTP = 25
What is the range for “well-known” ports?
0 to 1023
Explain Distance Vector Routing. What are some of the common protocols used?
Each router on the network communicates all the routes it knows to the routers to which it is directly attached.
Common protocols include: RIP, RIPv2, BGP, and EIGRP
Explain Link-State routing. What are some of the common protocols used?
Link-state routing builds a map of the entire network and holds it in memory.
Common protocols include: Open Shortest Path First (OSPF) and Intermediate System-to-Intermediate System (IS-IS)
What is the loopback address for:
• IPv4
• IPv6
• IPv4 = 127.0.0.1
• IPv6 = 0:0:0:0:0:0:0:1 (::1)
What is the IPv4 private link-local address? What is the prefix for the same when using IPv6?
• IPv4 = 169.254.0.0
• IPv6 prefix = FE80::
What address range and subnet mask does APIPA assign addresses from?
Address range = 169.254.0.0
Subnet Mask = 255.255.0.0
What numbers and letters can be used to assign a MAC address?
0 -9
A – F
What is the basic principle of NAT?
NAT allows many computers to “hide” behind a single IP address.
What is the purpose of the ARP protocol?
Links IP addressing to MAC addressing
At what layer of the OSI model does the TCP three-way handshake process take place?
Transport Layer 4
What type of device is used to separate broadcast domains?
Router
What restricts specific ports and IP addresses from accessing the internal network (list two answers)?
1. Firewall
2. Access Control List (ACL)
What TCP/IP utilities allow you to view the routing table (list two answers)?
1. Route
2. Netstat
What protocol maps Layer 2 addresses to Layer 3 addresses?
Reverse Address Resolution Protocol
What does the Session Initiation Protocol (SIP) do?
SIP = Application Layer protocol. It is designed to establish/maintain multimedia sessions.
What does a network bridge accomplish?
A bridge is used to divide larger networks into smaller sections by sitting between two physical network segments and managing the flow of data between the two.
What is the purpose of a firewall?
A firewall can be either software or hardware-based and controls access to an organization’s network.
In a crossover cable, which wires are crossed?
Wires 1 & 3 and 2 & 6 are crossed.
At what point does the service provider stop being responsible for the line and it becomes the responsibility of the owner?
Demarcation point or simply demark.
Explain packet switching.
Messages are broken into smaller pieces called packets which are assigned source, destination and intermediate node address.
Compare both BRI and PRI ISDN.
Characteristic BRI PRI
Speed 128Kbps 1.544Mbps
Channels 2B+D 23B+D
Transmission carrier ISDN T1
What transmission speeds do the following offer:?
T1
T3
E1
E3
T1 = 1.544Mbps
T3 = 44.736Mbps
E1 = 2.048Mbps
E3 = 34.368Mbps
What is Synchronous Optical Network (SONET)?
A fiber-optic WAN technology that delivers voice, data and video at speeds starting at 51.84Mbps.
What is the transmission rate of OC-1?
51.84Mbps
What does the term Attenuation refer to?
Attenuation refers to the weakening of data signals as they travel through a medium.
What purpose does a rollover cable serve?
A rollover cable is used to connect a computer system to a router or switch console port. It is a Cisco proprietary cable.
What purpose does a loopback cable (or plug) serve?
A loopback cable/plug is a basic troubleshooting tool used to test and isolate network problems.
What does a CSU/DSU do?
It acts as a translator between LAN data format and the WAN data format.
What speed and distance do the following Ethernet standards support?
• 10BaseT
• 100BaseTX/100BaseFX
• 1000BaseX
• 1000BaseT
• 10GBaseT
• 10BaseT = 10Mbps and 100 meters
• 100BaseTX/100BaseFX = 100Mbps and 100 and 412 meters respectively
• 1000BaseX = 1000Mbps and various distances depending on type (CX = 25 meters)
• 1000BaseT = 1000Mbps and 75 meters
• 10GBaseT = 10 gigabit and 100 meters
What information can be obtained using the netstat command?
The netstat command displays incoming/outgoing connections, routing tables and network interface statistics.
What information can be obtained using the ping command?
The ping tool is used to test the availability of a computer over a network.
What information can be obtained using the ipconfig command?
The ipconfig tool displays a computer’s IP address, subnet mask and default gateway. It can also be used to release/renew a DHCP lease.
What information can be obtained using the tracert command?
The tracert tool is used to determine the route a packet takes across a Windows IP network. In the UNIX world, there is a similar tool called ‘traceroute.’
What does QoS provide?
Quality of Service (QoS) provides varying levels of network bandwidth based on the traffic type.
Describe the various types of intrusion detection systems (IDS):
• Network-based IDS
• Anomaly-based IDS
• Behavior-based IDS
• Signature-based IDS
• Network-based IDS – attached to the network in a place where it can monitor all network traffic. It implements passive and active responses.
• Anomaly-based IDS – detects activities that are unusual based on pre-established baselines.
• Behavior-based IDS – looks for behavior that is not allowed and acts accordingly.
• Signature-based IDS – relies upon a database that contains the identities of possible attacks. It watches for intrusions that match a known identity or signature.
Which layer of the OSI model does the Internet layer of the TCP/IP model correspond?
Network Layer 3
What layer of the OSI model do both Frame Sequencing and Frame Error Checking take place?
Data Link Layer 2
What type of address can be converted into an Extended Unique Identifier (EUI)-64 address?
MAC Address
Which information do bridges and Layer 2 switches use to forward packets to their destination?
MAC Address
You administer a TCP/IP network that is not subnetted. One of the network hosts has the following IP address: 130.250.0.10. What is the network ID of the network you administer?
130.250.0.0 (hint – the address range beginning with 130 makes this a Class B address, meaning the Subnet Mask is 255.255.0.0. Therefore, the Network portion of the address is the first two octets.
Which protocol is categorized as an Exterior Gateway Protocol (EGP)?
BGP
Which TCP port is the well-known port assigned to SSL?
Port 443 (same as HTTPS)
What is an example of a protocol that provides bi-directional file transfers?
FTP
You have decided to implement 802.1q. What does this standard do?
VLAN Trunking
What is the name of the SNMP software component that runs on a managed device, such as a router or switch?
SNMP Agent
Which device connects wireless devices to a wired local area network?
Access Point
Which term is used to refer to the angle of radiation of an antenna?
Beamwidth
Which media-access method does the 802.11 standard specify for wireless networks?
CSMA/CA
What is used to separate the voice and data signals on a Digital Subscriber Line (DSL) connection at the phone company?
Splitter
Which type of cable is used in a 1000Base-LX or SX network?
Fiber Optic
What device is used to connect a WAN connection to the LAN connection of a network?
CSU/DSU
Which Windows TCP/IP utility displays protocol statistics and connections using NetBIOS?
Nbtstat
Which protocol is used to monitor network devices?
SNMP
What are the two levels of encryption offered by WEP?
64-bit and 128-bit
Which protocol uses public, private and symmetric keys to encrypt and decrypt data over the Internet?
SSL
What can a company use to allow remote users to access their Windows network remotely if their network is not connected to the Internet?
RAS
Which technology provides centralized remote user authentication, authorization and accounting?
RADIUS