Netacad Test Chapters 1-3

¡Supera tus tareas y exámenes ahora con Quizwiz!

How do you properly setup a virtual connection to be accessed remotely?

To access the switch remotely, an IP address and a subnet mask must be configured on the SVI. To configure an SVI on a switch, use the interface vlan 1 global configuration command. Next assign an IPv4 address using the ip address "ip-address subnet-mask" interface configuration command. Finally, enable the virtual interface using the no shutdown interface configuration command.

What is the purpose Industry Standards

To provide interoperability between different devices

What is the purpose of the MAC Address?

To send data locally in a LAN. The Mac Address Contains two things - The source MAC Address - The destination MAC Address

What are the three different message delivery options

Unicast - Host sends a message to one destination. Multicast - Delivery of the same message to a group of host destinations. Broadcast - Host sends a message to all other devices on the network.

What are the two primary command modes

User EXEC Mode Switch> Privileged EXEC Mode Switch#

Name the 5 different types of networks

WAN- Wide Area LAN- Local Area WLAN- Wireless LAN SAN- Storage Area MAN- Metropolitan Area

How do you get into global config mode on a CLI while in Privileged EXEC Mode?

configure terminal Switch(config)#

How do you save what is in running config to starup config?

copy running-config startup-config (Must be in privileged EXEC mode)

What are the various commands that you can use in CLI

enable - takes you into Privlaged EXEC Mode disable - Returns to User EXEC Mode configure terminal - takes you into global config mode exit - returns you to the previous privilege end or cntrl-z - takes you back to the privileged EXEC Mode cntrl E- brings you to the end of the line cntrl A- brings you to the beginning of the line cntrl shift 6- interrupts an IOS process such as ping or trace route cntrl c - clear configuration up/down arrows - allows the user to scroll through former commands Tab - Completes the remainder of a partially typed command

How to password protect the Privileged Exec Access

enable secret "password"

If you mess something up in startup config, how do you reset it?

erase startup-config.

Once in Global Configuration, how do you get into the interface configuration mode

interface vlan 1 Switch(config-if)#

what is running config?

running-config - The file stored in Random Access Memory (RAM) that reflects the current configuration. Modifying a running configuration affects the operation of a Cisco device immediately. RAM is volatile memory. It loses all of its content when the device is powered off or restarted.

What are the different ways to Limit Device access

securing administrative access - Secure privileged exec access with a password - Secure User EXEC access with a password - Secure remote tellnet access with a password Other tasks -Encrypt all passwords -Provide Legal Notification

How do you encrypt all passwords automatically

service password-encrypt

How do you show the condition of switch interfaces?

show ip interface brief

What is startup config?

startup-config - The file stored in Non-volatile Random Access Memory (NVRAM) that contains all of the commands that will be used by the device upon startup or reboot. NVRAM does not lose its contents when the device is powered off.

How do you create a banner

switch# banner motd

What are the various requirements a manager needs to worry about when choosing a network media for his office?

- Distance the media can successfully carry a signal - Environment in which the media is to be installed - Amount of data and the speed at which it must be transmitted - Cost of the media and installation

What is each layers function on the OSI model?

7. Application - Contains Protocols used for process-to-process communication 6. Presentation - Provides for common representation of the data transferred between application layer services 5. Session - Provides services to the presentation layer to organize its dialogue and to manage data exchange 4. Transport - defines services to segment, transfer, and reassemble the data for individual communication between the end devices. 3. Network - Assigns the destination and source IP. Provides a data path or route 2. Data Link - Builds a frame for the data. Methods for exchanging data frames between devices over a common media 1. Physical - Physical connections for bit transmission to and from a network device.

What are the seven layers of the OSI model and their PDU?

7. Application - Data 6. Presentation - Data 5. Session - Data 4. Transport - Segments 3. Network - Packets 2. Data Link - Frame 1. Physical - Bits

What are the basic requirements that protocols must account for basic communication.

An identified sender and receiver Common language and grammar Speed and timing of delivery Confirmation or acknowledgment requirements

What are the TCP/IP Protocols at each Layer of the TCP/IP Suite

Application - DNS, BooTP, DCHP, SMTP, POP, IMAP, FTP, TFTP, HTTP Transport - UDP, TCP Internet - IPv4, IPv6, ICMPv4, ICMPv6, NAT, ICMP, OSPF, EIGRP Network Access - ARP, PPP, Ethernet, Interface Drivers, Frame Relay

What are the four layers of the TCP/IP Model and what they do?

Application - Governs the way a web server and client interact Transport - Manages individual conversations Internet - determines the best path through the network. Does segmentation and encapsulation. Network Access - Controls the hardware devices and media that make up the network. Prepares packets to be sent on the media

What are the new trends out there in bussiness?

Bring Your Own Device (BYOD) Online collaboration Video communications Cloud computing

What is the purpose of multiplexing?

By sending smaller individual pieces from source to destination, many different conversations can be interleaved on the network.

What Interface do we use to enter into our IOS

CLI

What are the different types of home and small office internet connections.

Cable - goes over a tv line Digital Subscriber Line - goes over a telephone line Cellular Satellite Dial-up telephone

What are the four methods to access your Cisco switch and give their definitions

Console - Direct Connection SSH - (Secure Shell) A method of securely establishing a remote connection Telnet - A method of establishing a remote connection. (NOT SECURE) Aux - Telephone connection

What is the difference between old and today's networks?

Convergence

What are the different types of business connections

Dedicated Leased Line Ethernet WAN DSL Satellite

What is the TCP/IP Communication encapsulation process?

Diagram of a completed TCP/IP Frame | Etherenet | IP| TCP | HTTP | Data | Ethernet | Data gets encapsulated into HTTP Data HTTP Data get encapsulated into TCP Segments TCP Segments get encapsulated into IP Packets IP Packets get encapsulated into Ethernet Frames

What is the standard notation for IPv4 addresses?

Dotted decimal notation (ex 192.50.29.4)

What protocol automatically finds the IPv4 address, Subnet mask, Default gateway, and DNS server for the device when it first connects to a network.

Dynamic Host Configuration Protocol (DHCP).

What is the definition of Encapsulation/De-encapsulation

Encapsulation - The process of placing one message format into another message format De-encapsulation - The reverse of encapsulation

What is the definition of encoding/decoding

Encoding is the process of converting information into another acceptable form, for transmission. Decoding reverses this process in order to interpret the information.

What are the qualities of a reliable network?

Fault Tolerance, Scalability, Quality of Service, Security

What are the common networking protocols

HTTP TCP IP ETHERNET

What is the command to create a hostname

Hostname " "

What are the various companies that create industry standards.

ISOC IAB IETF IRTF ICANN IANA IEEE EIA TIA ITU-T ISO

What is the difference of a intranet and extranet?

Intranet- a private connection of LANs and WANs that belongs to an organization, and is designed to be accessible only by the organization's members, employees, or others with authorization. Extranet - provide secure and safe access to individuals who work for a different organization, but require access to the organization's data.

What is the portion of OS that deals with the computer directly?

Kernel

What is the purpose of Line Configuration Mode and Interface Configuration Mode

Line Configuration Mode - Used to configure console, SSH, Telnet, or AUX access. Switch(config-line)# Interface Configuration Mode - Used to configure a switch port or router network interface. Switch(config-if)#

What five requirements are defined by the protocols used in network communcations to allow message transmission across a network?

Message Encoding Message Formatting and Encapsulation Message Size Message Timing Message Delivery Options

What is the definition of peer-to-peer? What are the advantages/disadvantages?

Peer-to-peer: A device that serves as a sever and a client at the same time The advantages of peer-to-peer networking: Easy to set up Less complexity Lower cost since network devices and dedicated servers may not be required Can be used for simple tasks such as transferring files and sharing printers The disadvantages of peer-to-peer networking: No centralized administration Not as secure Not scalable Potential for slow performance

What is the general name that a piece of data takes at any layer?

Protocol Data Unit (PDU)

What does the reload command do?

Restarts your device. Good for when you accidentally messed up your running config

What is the portion of OS that interfaces with the applications and the user?

Shell

What are technology trends in the home?

Smart home technology Power line Networking WISP - Wireless Internet Service Provider WBS - Wireless Broadband Service

What are the guidelines to choosing a hostname

Start with a letter Contain no spaces End with a letter or digit Uses only letters, digits, and dashes Be less than 64 characters in length

What is the purpose of the logical address?

The IP (Logical) address are used to identify the source and destination device for the packet The IP address has two parts - Source IP Address - Destination IP Address The IP Address is broken into two different portions - Network Portion - Host Portion |Network| |Host| Ex. 194.50.110. 89

What is a trait of network protocols

They define how messages are exchanged between the source and destination.


Conjuntos de estudio relacionados

The Enlightenment and The Scientific Revolution

View Set

Immunology Exam 1 MC, T/F Quiz Questions

View Set

Chapter 1 Environmental Problems, Their Causes, and Sustainability

View Set

New English Adventure 2 - Unit Hello

View Set

Language: What Develops in the First Two Years?

View Set

Older Adult Ch. 9 Geropharmacology

View Set

Ch. 48 Skin Integrity and Wound Care

View Set

264- Binary, HEX & ASCII Study Guide- Quiz Questions-Spiker.J

View Set

FIN 1115 01---Personal Finance Exam 1 Questions

View Set

Nursing Management of the Pregnancy at Risk: Selected Health Conditions and Vulnerable Populations: Chapter 20: PrepU

View Set