Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
66 Cards in this Set
- Front
- Back
What is the purpose of the Spanning Tree Protocol (STP)?
|
STP actively monitors the network, searching for redundant links. If found, it shuts them down to prevent switching loops
|
|
What are the two most common functions of DNS?
|
(1) Resolve hostnames to IP addresses. (2) Perform IP address-to-hostname resolution (reverse lookup using pointer (PTR) records)
|
|
What is SNMP?
|
SNMP is a protocol that facilitates network management functionality. It enables network devices to communicate information about their state to a central system.
|
|
What is the IP range for the following Network Classes?
A B C |
Class A = 1 – 126
Class B = 128 - 191 Class C = 192 – 223 |
|
True or False?
Subnetting increases the number of IP addresses available? |
False – Subnetting does not increase the number of IP addresses available. It increases the number of network IDs.
|
|
List the private address ranges for Class A, B, and C addresses.
|
Class A = 10.0.0.0 – 10.255.255.255
Class B = 172.16.0.0 – 172.31.255.255 Class C = 192.168.0.0 – 192.168.255.255 |
|
What are the 7-layers of the OSI model
|
7. Application
6. Presentation 5. Session 4. Transport 3. Network 2. Data Link 1. Physical |
|
What layer of the OSI model do the following operate?
A. IP B. TCP C. FTP D. Flow Control E. ARP |
A. IP = Network Layer 3
B. TCP = Transport Layer 4 C. FTP = Application Layer 7 D. Flow Control = Transport Layer 4 E. ARP = Data Link Layer 2 |
|
What port do the following use?
A. FTP B. SSH C. Telnet D. DNS E. HTTPS F. HTTP G. NTP H. RDP I. POP3 J. IMAP4 K. SMTP |
A. FTP = 20 & 21
B. SSH = 22 C. Telnet = 23 D. DNS = 53 E. HTTPS = 443 F. HTTP = 80 G. NTP = 123 H. RDP = 3389 I. POP3 = 110 J. IMAP4 = 143 K. SMTP = 25 |
|
What is the range for “well-known” ports?
|
0 to 1023
|
|
Explain Distance Vector Routing. What are some of the common protocols used?
|
Each router on the network communicates all the routes it knows to the routers to which it is directly attached.
Common protocols include: RIP, RIPv2, BGP, and EIGRP |
|
Explain Link-State routing. What are some of the common protocols used?
|
Link-state routing builds a map of the entire network and holds it in memory.
Common protocols include: Open Shortest Path First (OSPF) and Intermediate System-to-Intermediate System (IS-IS) |
|
What is the loopback address for:
• IPv4 • IPv6 |
• IPv4 = 127.0.0.1
• IPv6 = 0:0:0:0:0:0:0:1 (::1) |
|
What is the IPv4 private link-local address? What is the prefix for the same when using IPv6?
|
• IPv4 = 169.254.0.0
• IPv6 prefix = FE80:: |
|
What address range and subnet mask does APIPA assign addresses from?
|
Address range = 169.254.0.0
Subnet Mask = 255.255.0.0 |
|
What numbers and letters can be used to assign a MAC address?
|
0 -9
A – F |
|
What is the basic principle of NAT?
|
NAT allows many computers to “hide” behind a single IP address.
|
|
What is the purpose of the ARP protocol?
|
Links IP addressing to MAC addressing
|
|
At what layer of the OSI model does the TCP three-way handshake process take place?
|
Transport Layer 4
|
|
What type of device is used to separate broadcast domains?
|
Router
|
|
What restricts specific ports and IP addresses from accessing the internal network (list two answers)?
|
1. Firewall
2. Access Control List (ACL) |
|
What TCP/IP utilities allow you to view the routing table (list two answers)?
|
1. Route
2. Netstat |
|
What protocol maps Layer 2 addresses to Layer 3 addresses?
|
Reverse Address Resolution Protocol
|
|
What does the Session Initiation Protocol (SIP) do?
|
SIP = Application Layer protocol. It is designed to establish/maintain multimedia sessions.
|
|
What does a network bridge accomplish?
|
A bridge is used to divide larger networks into smaller sections by sitting between two physical network segments and managing the flow of data between the two.
|
|
What is the purpose of a firewall?
|
A firewall can be either software or hardware-based and controls access to an organization’s network.
|
|
In a crossover cable, which wires are crossed?
|
Wires 1 & 3 and 2 & 6 are crossed.
|
|
At what point does the service provider stop being responsible for the line and it becomes the responsibility of the owner?
|
Demarcation point or simply demark.
|
|
Explain packet switching.
|
Messages are broken into smaller pieces called packets which are assigned source, destination and intermediate node address.
|
|
Compare both BRI and PRI ISDN.
|
Characteristic BRI PRI
Speed 128Kbps 1.544Mbps Channels 2B+D 23B+D Transmission carrier ISDN T1 |
|
What transmission speeds do the following offer:?
T1 T3 E1 E3 |
T1 = 1.544Mbps
T3 = 44.736Mbps E1 = 2.048Mbps E3 = 34.368Mbps |
|
What is Synchronous Optical Network (SONET)?
|
A fiber-optic WAN technology that delivers voice, data and video at speeds starting at 51.84Mbps.
|
|
What is the transmission rate of OC-1?
|
51.84Mbps
|
|
What does the term Attenuation refer to?
|
Attenuation refers to the weakening of data signals as they travel through a medium.
|
|
What purpose does a rollover cable serve?
|
A rollover cable is used to connect a computer system to a router or switch console port. It is a Cisco proprietary cable.
|
|
What purpose does a loopback cable (or plug) serve?
|
A loopback cable/plug is a basic troubleshooting tool used to test and isolate network problems.
|
|
What does a CSU/DSU do?
|
It acts as a translator between LAN data format and the WAN data format.
|
|
What speed and distance do the following Ethernet standards support?
• 10BaseT • 100BaseTX/100BaseFX • 1000BaseX • 1000BaseT • 10GBaseT |
• 10BaseT = 10Mbps and 100 meters
• 100BaseTX/100BaseFX = 100Mbps and 100 and 412 meters respectively • 1000BaseX = 1000Mbps and various distances depending on type (CX = 25 meters) • 1000BaseT = 1000Mbps and 75 meters • 10GBaseT = 10 gigabit and 100 meters |
|
What information can be obtained using the netstat command?
|
The netstat command displays incoming/outgoing connections, routing tables and network interface statistics.
|
|
What information can be obtained using the ping command?
|
The ping tool is used to test the availability of a computer over a network.
|
|
What information can be obtained using the ipconfig command?
|
The ipconfig tool displays a computer’s IP address, subnet mask and default gateway. It can also be used to release/renew a DHCP lease.
|
|
What information can be obtained using the tracert command?
|
The tracert tool is used to determine the route a packet takes across a Windows IP network. In the UNIX world, there is a similar tool called ‘traceroute.’
|
|
What does QoS provide?
|
Quality of Service (QoS) provides varying levels of network bandwidth based on the traffic type.
|
|
Describe the various types of intrusion detection systems (IDS):
• Network-based IDS • Anomaly-based IDS • Behavior-based IDS • Signature-based IDS |
• Network-based IDS – attached to the network in a place where it can monitor all network traffic. It implements passive and active responses.
• Anomaly-based IDS – detects activities that are unusual based on pre-established baselines. • Behavior-based IDS – looks for behavior that is not allowed and acts accordingly. • Signature-based IDS – relies upon a database that contains the identities of possible attacks. It watches for intrusions that match a known identity or signature. |
|
Which layer of the OSI model does the Internet layer of the TCP/IP model correspond?
|
Network Layer 3
|
|
What layer of the OSI model do both Frame Sequencing and Frame Error Checking take place?
|
Data Link Layer 2
|
|
What type of address can be converted into an Extended Unique Identifier (EUI)-64 address?
|
MAC Address
|
|
Which information do bridges and Layer 2 switches use to forward packets to their destination?
|
MAC Address
|
|
You administer a TCP/IP network that is not subnetted. One of the network hosts has the following IP address: 130.250.0.10. What is the network ID of the network you administer?
|
130.250.0.0 (hint – the address range beginning with 130 makes this a Class B address, meaning the Subnet Mask is 255.255.0.0. Therefore, the Network portion of the address is the first two octets.
|
|
Which protocol is categorized as an Exterior Gateway Protocol (EGP)?
|
BGP
|
|
Which TCP port is the well-known port assigned to SSL?
|
Port 443 (same as HTTPS)
|
|
What is an example of a protocol that provides bi-directional file transfers?
|
FTP
|
|
You have decided to implement 802.1q. What does this standard do?
|
VLAN Trunking
|
|
What is the name of the SNMP software component that runs on a managed device, such as a router or switch?
|
SNMP Agent
|
|
Which device connects wireless devices to a wired local area network?
|
Access Point
|
|
Which term is used to refer to the angle of radiation of an antenna?
|
Beamwidth
|
|
Which media-access method does the 802.11 standard specify for wireless networks?
|
CSMA/CA
|
|
What is used to separate the voice and data signals on a Digital Subscriber Line (DSL) connection at the phone company?
|
Splitter
|
|
Which type of cable is used in a 1000Base-LX or SX network?
|
Fiber Optic
|
|
What device is used to connect a WAN connection to the LAN connection of a network?
|
CSU/DSU
|
|
Which Windows TCP/IP utility displays protocol statistics and connections using NetBIOS?
|
Nbtstat
|
|
Which protocol is used to monitor network devices?
|
SNMP
|
|
What are the two levels of encryption offered by WEP?
|
64-bit and 128-bit
|
|
Which protocol uses public, private and symmetric keys to encrypt and decrypt data over the Internet?
|
SSL
|
|
What can a company use to allow remote users to access their Windows network remotely if their network is not connected to the Internet?
|
RAS
|
|
Which technology provides centralized remote user authentication, authorization and accounting?
|
RADIUS
|