Netacad Test Chapters 1-3
How do you properly setup a virtual connection to be accessed remotely?
To access the switch remotely, an IP address and a subnet mask must be configured on the SVI. To configure an SVI on a switch, use the interface vlan 1 global configuration command. Next assign an IPv4 address using the ip address "ip-address subnet-mask" interface configuration command. Finally, enable the virtual interface using the no shutdown interface configuration command.
What is the purpose Industry Standards
To provide interoperability between different devices
What is the purpose of the MAC Address?
To send data locally in a LAN. The Mac Address Contains two things - The source MAC Address - The destination MAC Address
What are the three different message delivery options
Unicast - Host sends a message to one destination. Multicast - Delivery of the same message to a group of host destinations. Broadcast - Host sends a message to all other devices on the network.
What are the two primary command modes
User EXEC Mode Switch> Privileged EXEC Mode Switch#
Name the 5 different types of networks
WAN- Wide Area LAN- Local Area WLAN- Wireless LAN SAN- Storage Area MAN- Metropolitan Area
How do you get into global config mode on a CLI while in Privileged EXEC Mode?
configure terminal Switch(config)#
How do you save what is in running config to starup config?
copy running-config startup-config (Must be in privileged EXEC mode)
What are the various commands that you can use in CLI
enable - takes you into Privlaged EXEC Mode disable - Returns to User EXEC Mode configure terminal - takes you into global config mode exit - returns you to the previous privilege end or cntrl-z - takes you back to the privileged EXEC Mode cntrl E- brings you to the end of the line cntrl A- brings you to the beginning of the line cntrl shift 6- interrupts an IOS process such as ping or trace route cntrl c - clear configuration up/down arrows - allows the user to scroll through former commands Tab - Completes the remainder of a partially typed command
How to password protect the Privileged Exec Access
enable secret "password"
If you mess something up in startup config, how do you reset it?
erase startup-config.
Once in Global Configuration, how do you get into the interface configuration mode
interface vlan 1 Switch(config-if)#
what is running config?
running-config - The file stored in Random Access Memory (RAM) that reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.
What are the different ways to Limit Device access
securing administrative access - Secure privileged exec access with a password - Secure User EXEC access with a password - Secure remote tellnet access with a password Other tasks -Encrypt all passwords -Provide Legal Notification
How do you encrypt all passwords automatically
service password-encrypt
How do you show the condition of switch interfaces?
show ip interface brief
What is startup config?
startup-config - The file stored in Non-volatile Random Access Memory (NVRAM) that contains all of the commands that will be used by the device upon startup or reboot. NVRAM does not lose its contents when the device is powered off.
How do you create a banner
switch# banner motd
What are the various requirements a manager needs to worry about when choosing a network media for his office?
- Distance the media can successfully carry a signal - Environment in which the media is to be installed - Amount of data and the speed at which it must be transmitted - Cost of the media and installation
What is each layers function on the OSI model?
7. Application - Contains Protocols used for process-to-process communication 6. Presentation - Provides for common representation of the data transferred between application layer services 5. Session - Provides services to the presentation layer to organize its dialogue and to manage data exchange 4. Transport - defines services to segment, transfer, and reassemble the data for individual communication between the end devices. 3. Network - Assigns the destination and source IP. Provides a data path or route 2. Data Link - Builds a frame for the data. Methods for exchanging data frames between devices over a common media 1. Physical - Physical connections for bit transmission to and from a network device.
What are the seven layers of the OSI model and their PDU?
7. Application - Data 6. Presentation - Data 5. Session - Data 4. Transport - Segments 3. Network - Packets 2. Data Link - Frame 1. Physical - Bits
What are the basic requirements that protocols must account for basic communication.
An identified sender and receiver Common language and grammar Speed and timing of delivery Confirmation or acknowledgment requirements
What are the TCP/IP Protocols at each Layer of the TCP/IP Suite
Application - DNS, BooTP, DCHP, SMTP, POP, IMAP, FTP, TFTP, HTTP Transport - UDP, TCP Internet - IPv4, IPv6, ICMPv4, ICMPv6, NAT, ICMP, OSPF, EIGRP Network Access - ARP, PPP, Ethernet, Interface Drivers, Frame Relay
What are the four layers of the TCP/IP Model and what they do?
Application - Governs the way a web server and client interact Transport - Manages individual conversations Internet - determines the best path through the network. Does segmentation and encapsulation. Network Access - Controls the hardware devices and media that make up the network. Prepares packets to be sent on the media
What are the new trends out there in bussiness?
Bring Your Own Device (BYOD) Online collaboration Video communications Cloud computing
What is the purpose of multiplexing?
By sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network.
What Interface do we use to enter into our IOS
CLI
What are the different types of home and small office internet connections.
Cable - goes over a tv line Digital Subscriber Line - goes over a telephone line Cellular Satellite Dial-up telephone
What are the four methods to access your Cisco switch and give their definitions
Console - Direct Connection SSH - (Secure Shell) A method of securely establishing a remote connection Telnet - A method of establishing a remote connection. (NOT SECURE) Aux - Telephone connection
What is the difference between old and today's networks?
Convergence
What are the different types of business connections
Dedicated Leased Line Ethernet WAN DSL Satellite
What is the TCP/IP Communication encapsulation process?
Diagram of a completed TCP/IP Frame | Etherenet | IP| TCP | HTTP | Data | Ethernet | Data gets encapsulated into HTTP Data HTTP Data get encapsulated into TCP Segments TCP Segments get encapsulated into IP Packets IP Packets get encapsulated into Ethernet Frames
What is the standard notation for IPv4 addresses?
Dotted decimal notation (ex 192.50.29.4)
What protocol automatically finds the IPv4 address, Subnet mask, Default gateway, and DNS server for the device when it first connects to a network.
Dynamic Host Configuration Protocol (DHCP).
What is the definition of Encapsulation/De-encapsulation
Encapsulation - The process of placing one message format into another message format De-encapsulation - The reverse of encapsulation
What is the definition of encoding/decoding
Encoding is the process of converting information into another acceptable form, for transmission. Decoding reverses this process in order to interpret the information.
What are the qualities of a reliable network?
Fault Tolerance, Scalability, Quality of Service, Security
What are the common networking protocols
HTTP TCP IP ETHERNET
What is the command to create a hostname
Hostname " "
What are the various companies that create industry standards.
ISOC IAB IETF IRTF ICANN IANA IEEE EIA TIA ITU-T ISO
What is the difference of a intranet and extranet?
Intranet- a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization. Extranet - provide secure and safe access to individuals who work for a different organization, but require access to the organization's data.
What is the portion of OS that deals with the computer directly?
Kernel
What is the purpose of Line Configuration Mode and Interface Configuration Mode
Line Configuration Mode - Used to configure console, SSH, Telnet, or AUX access. Switch(config-line)# Interface Configuration Mode - Used to configure a switch port or router network interface. Switch(config-if)#
What five requirements are defined by the protocols used in network communcations to allow message transmission across a network?
Message Encoding Message Formatting and Encapsulation Message Size Message Timing Message Delivery Options
What is the definition of peer-to-peer? What are the advantages/disadvantages?
Peer-to-peer: A device that serves as a sever and a client at the same time The advantages of peer-to-peer networking: Easy to set up Less complexity Lower cost since network devices and dedicated servers may not be required Can be used for simple tasks such as transferring files and sharing printers The disadvantages of peer-to-peer networking: No centralized administration Not as secure Not scalable Potential for slow performance
What is the general name that a piece of data takes at any layer?
Protocol Data Unit (PDU)
What does the reload command do?
Restarts your device. Good for when you accidentally messed up your running config
What is the portion of OS that interfaces with the applications and the user?
Shell
What are technology trends in the home?
Smart home technology Power line Networking WISP - Wireless Internet Service Provider WBS - Wireless Broadband Service
What are the guidelines to choosing a hostname
Start with a letter Contain no spaces End with a letter or digit Uses only letters, digits, and dashes Be less than 64 characters in length
What is the purpose of the logical address?
The IP (Logical) address are used to identify the source and destination device for the packet The IP address has two parts - Source IP Address - Destination IP Address The IP Address is broken into two different portions - Network Portion - Host Portion |Network| |Host| Ex. 194.50.110. 89
What is a trait of network protocols
They define how messages are exchanged between the source and destination.