CCNA V2.0 Questions and Flash Cards

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Solicited Node Multicast Address

FF02:0:0:0:0:1:FF/104; last 24-bits taken from interface-ID; automatically provisioned like link-local addresses; used for L3-to-L2 address resolution

C • Wireless networks broadcast data over a medium that allows easy access.

Why is security so important in wireless networks? A • Wireless networks are typically slower than wired networks. B • Televisions and other devices can interfere with wireless signals. C • Wireless networks broadcast data over a medium that allows easy access. D • Environmental factors such as thunderstorms can affect wireless networks.

D. to enable the switch to be managed remotely

Why would a Layer 2 switch need an IP address? A. to enable the switch to receive frames from attached PCs B. to enable the switch to send broadcast frames to attached PCs C. to enable the switch to function as a default gateway D. to enable the switch to be managed remotely

to copy an existing configuration into RAM

Why would a technician enter the command copy startup-config running-config?

The default gateway address is used to forward packets originating from the switch to remote networks. Refer to curriculum topic: 6.4.3 A default gateway address allows a switch to forward packets that originate on the switch to remote networks. A default gateway address on a switch does not provide Layer 3 routing for PCs that are connected on that switch. A switch can still be accessible from Telnet as long as the source of the Telnet connection is on the local network.

Within a production network, what is the purpose of configuring a switch with a default gateway address?

UDP will not disrupt the game to retransmit dropped packets.

You are creating a network-based video game. What influences your decision about which transport protocol to use for the application?

FDDI

__________ has both physical and logical ring topologies.

802.3

___________is a working group and a collection of IEEE standards produced by the working group defining the physical layer and data link layer's media access control (MAC) of wired Ethernet.

T3

aka DS3, 28 DS1s (T1s) bundled together, 44.736 Mbps

DUAL (defusing update algorithm)

algorithm EIGRP uses to learn, track, determine best route; successor (best route having lowest total metric, distance); Feasible successor (backup routes with higher metrics); feasible distance (best, lowest, total distance between local router and destination prefix); Reported distance (distance from neighbor to destination); Neighbor table (neighbor info is recorded); EIGRP topology table (backup routes recorded; routing table (best routes recorded)

Variance

allows unequal cost load-balancing: router(config)# router eigrp 100; router(config-rtr)# variance X; X is simply a multiplier (mulitiply FD of all routes in topology table by "X" = result "YY" for each route; compare result "YY" against all Feasible Successors; if distance of any FS routes <= YY, install route in table)

T1

also called DS1, 24-DS0s 1.544 Mbps

Committed Information Rate (CIR)

amount of data rate that a service provider guarantees; anything above the [TERM] is considered as burst

Standard ACL

filters traffic based on layer 3 header; source IP address is checked; ACL standard numbers range from 1-99; should be applied nearest to destination; no intelligence of checking destination address and port numbers Applying configuration: router(config-if)# ip access-group <ACL no> <in | out> Configuration: router(config)# access-list <ACL no> <permit | deny> <source address> <wild card mask> Verification: router# show ip access-list; router# show ip interface; router# show run | inc access-list

Configures the PVC address on a serial interface or subinterface

frame-relay interface-dlci

Configures the LMI type on a serial link

frame-relay lmi-type

Creates a static mapping for use with a Frame Relay network

frame-relay map protocol address

Creates a multipoint subinterface on a serial link that can be used with Frame Relay networks

interface s0.16 multipoint

Creates a point-to-point subinterface on a serial link thatcan be used with Frame Relay

interface s0.16 point-to-point

Sets the type of ISDN switch that the router will communicate with. Can be set at interface level or global configuration mode

isdn switch-type

Puts you in configuration mode to change or set your user mode passwords

line

Changes a 2501 to boot without using the contents of NVRAM

o/r 0x2142

Port Address Translation (PAT)

one to many mapping; one public address can provide multiple host connections; usually deployed at client end; easier from the perspective of scalability Configuration - Router(config-if)# ip nat inside; Router(config-if)# ip nat outside; Router(config# access-list < acl no> <permit | deny > <source-address> <wildcard mask>; Router(config)# ip nat pool <name> <start-address> <end-address> netmask< subnet mask>; Router( config)# ip nat inside source list < acl no> pool <name> overload Verification: Router# show ip nat translation

Access Control List (ACL)

packet filtering mechanism; can filter packets on the basis of layer 3 and layer 4 header; should have at least one permit statement; works in sequential order, statement with lower sequence is preferred and checked; only one ACL can be applied per interface, per direction; each line in ACL is ACE, access control entry; Can be applied inbound and outbound (Inbound before routing, Outbound after routing); Implicit deny rule applied at the end of the sequence if nothing has been defined; Types of ACLs - standard ACL; extended ACL; named ACL (standard named, extended named) Configuration: router(config)# access-list <ACL no> <permit|deny> <protocol> <source address> <wildcard mask> <dest address> <wildcard mask> <port numbers> Verification: router# show ip access-list; router# show ip interface; router# show run | inc access-list Apply configuration: router(config-if)# ip access-group <ACL no> <in|out>

Shows the directly connected neighbors and the details about them

show cdp neighbor

Shows the IP address and IOS version and type, and includes all of the information from the show cdp neighbor command

show cdp neighbor detail

Shows the IPX access lists configured on a router

show ipx access-list

Shows the RIP and SAP information being sent and received on an individual interface. Also shows the IPX address of the interface

show ipx interface

Shows the IPX routing table

show ipx route

Shows the SAP table on a Cisco router

show ipx servers

Shows the RIP and SAP information sent and received on a Cisco router

show ipx traffic

Shows the number called and whether a call is in progress

show isdn active

Shows if your SPIDs are valid and if you are connected and communicating with the provider's switch.

show isdn status

Shows the routed protocols and network addresses configured on each interface

show protocols

Displays the running-config file; Short for show running-config

show run

C. displaying a list of all available commands within the current mode D. determining which option, keyword, or argument is available for the entered commandWhich two functions are provided to users by the context-sensitive help feature of the Cisco IOS CLI?

(Choose two.) A. providing an error message when a wrong command is submitted B. selecting the best command to accomplish a task C. displaying a list of all available commands within the current mode D. determining which option, keyword, or argument is available for the entered command E. allowing the user to complete the remainder of an abbreviated command with the TAB key

R1: G0/0 and S0/0/0 R2: G0/1 and S0/0/0 R1>enable R1# show ip int brief Interface IP-Address OK? Method Status Protocol GigabitEthernet0/0 192.168.20.1 YES manual up up GigabitEthernet0/1 192.168.30.1 YES manual administratively down down Serial0/0/0 209.165.200.225 YES manual up up Serial0/0/1 unassigned YES unset administratively down down Vlan1 unassigned YES unset administratively down down R2>enable R2#show ip int brief Interface IP-Address OK? Method Status Protocol GigabitEthernet0/0 10.1.2.1 YES manual administratively down down GigabitEthernet0/1 10.1.3.1 YES manual up up Serial0/0/0 209.165.200.226 YES manual up up Serial0/0/1 unassigned YES unset administratively down down Vlan1 unassigned YES unset administratively down down Refer to curriculum topic: 6.4.2 The command to use for this activity is show ip interface brief in each router. The active and operational interfaces are represented by the value "up" in the "Status" and "Protocol" columns. The interfaces in R1 with these characteristics are G0/0 and S0/0/0. In R2 they are G0/1 and S0/0/0.

Here is a link to the PT ActivityView in a new window. Open the PT activity. Perform the tasks in the activity instructions and then answer the question. Which interfaces in each router are active and operational?

A • ARP

Host A needs to learn the MAC address of Host B, which is on the same LAN segment. A message has been sent to all the hosts on the segment asking for the MAC address of Host B. Host B responds with its MAC address and all other hosts disregard the request. What protocol was used in this scenario? A • ARP B • DHCP C • DNS E • WINS

They have to keep their own local routing table that contains a route to the loopback interface, a local network route, and a remote default route.​

How do hosts ensure that their packets are directed to the correct network destination?

As an "uptime" annual percentage that is calculated by taking the number of minutes the network is available and dividing it by the number of minutes in a year, which is 525,600.

How is network Availability measured?

As the Mean time between Failures - or MTBF - which is a measurement used to indicate the likelihood of a component failing.

How is network Reliability measured?

Native VLAN

IEEE 802.1Q supported feature; Frame without tag is considered native VLAN traffic; Must match on both ends of the trunk; By default, native VLAN is 1; Can be changed using the switchporttrunk native vlan<vlan-id>command

Spanning-Tree Protocol (STP)

IEEE 802.1d; Legacy protocol to prevent Layer 2 loop; Usually called CST (Common Spanning Tree); No redundancy in traffic paths for frames; Timers: Hello (2 seconds), Max Age (20 seconds), Forward Delay (30 seconds); STP Calculation: Elects root bridgebased on the lowest BID, where BID consists of priority and MAC; Elects designated port, root port, and blocking ports based on STP cost or port priority; Provides loop-free path and seamless convergence during failure; Remember that with STP...LOWER is BETTER

Extended IP Access List

IP access list that filters the network by logical address, protocol field in the Network layer header, and even the port field in the Transport layer header

Standard IP Access List

IP access list that uses only the source IP addresses to filter a network

Is a global configuration command used to tell a router to forward packets to a default route when the destination network is not in the routing table

IP classless

B • default route

If a router receives a packet that it does not know how to forward, what type of route must be configured on the router to prevent the router from dropping it? A • dynamic route B • default route C • destination route D • default destination

The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

If the default gateway is configured incorrectly on the host, what is the impact on communications?

B • The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks.

If the default gateway is configured incorrectly on the host, what is the impact on communications? A • The host is unable to communicate on the local network. B • The host can communicate with other hosts on the local network, but is unable to communicate with hosts on remote networks. C • The host can communicate with other hosts on remote networks, but is unable to communicate with hosts on the local network. D • There is no impact on communications.

Password Authentication Protocol (PAP)

In PPP networks, a method of validating connection requests. The requesting (remote) device must send an authentication request, containing a password and ID, to the local router when attempting to connect. Unlike the more secure CHAP (Challenge Handshake Authentication Protocol), this sends the password unencrypted and does not attempt to verify whether the user is authorized to access the requested resource; it merely identifies the remote end

It requires that packets coming into the router be responses to internal host requests.

In the Linksys Security menu, what does the SPI Firewall Protection option Enabled provide?

Routing Updates

Incremental update (Only changes are sent in the routing update); Full update (All of the routing table is sent in the update); Periodic update (Sent in the specified time interval); Triggered update (Sent whenever change is detected)

Named ACL

Individual statements can be edited, unlike numbered ACLs; can be used with naming convention; use of name instead of number makes management easier; more flexible than numbered ACLs

Layered Architecture

Industry standard way of creating applications to work on a network; allows the application developer to make changes in only one layer instead of the whole program

Puts you in interface configuration mode for a FastEthernet port. Also used with show commands

Interface fastethernet 0/0

Creates a subinterface Interface serial 5 Puts you in configuration mode for interface serial 5 and can be used for show commands

Interface fastethernet 0/0.1

Asynchronous Transfer Mode (ATM)

International standard, identified by fixed-length 53-byte cells, for transmitting cells in multiple service systems, such as voice, video, or data. Transit delays are reduced because the fixed-length cells permit processing to occur in the hardware; designed to maximize the benefits of high-speed transmission media, such as SONET, E3, and T3; fiber used in [TERM] core network; last mile could be copper or fiber, mostly fiber; cells always same, fixed size of 53 bytes; primarily designed for latency sensitive apps

Wide Area Network (WAN)

Is a designation used to connect LANs together across a DCE (data communications equipment) network. Typically, it is a leased line or dial-up connection across a PSTN network. Examples of these protocols include Frame Relay, PPP, ISDN, and HDLC

0.0.0.0 255.255.255.255

Is a wildcard command; same as the any command

Network Termination 2 (NT2)

Is an ISDN designation to devices that do not understand ISDN standards. To use this, you must use a terminal adapter (TA)

Network Termination 1 (NT1)

Is an ISDN designation to devices that understand ISDN standards

Organizationally Unique Identifier (OUI)

Is assigned by the IEEE to an organization that makes network interface cards. The organization then puts it on each and every card they manufacture; 3 bytes (24 bits) long. The manufacturer then adds a 3-byte identifier to uniquely identify the host on an internetwork. The total length of the address is 48 bits (6 bytes) and is called a hardware address or MAC address

Registered Jack (RJ) Connector

Is used with twisted-pair wiring to connect the copper wire to network interface cards, switches, and hubs

Data Link Layer

Layer 2 of the OSI reference model, it ensures the trustworthy transmission of data across a physical link and is primarily concerned with physical addressing, line discipline, network topology, error notification, ordered delivery of frames, and flow control. The IEEE has further segmented this layer into the MAC sublayer and the LLC sublayer. Also known as the Link layer. Can be compared somewhat to the Data Link control layer of the SNA model; MAC (48-bit addressing system; Example: aaaa.aaaa.aaaa; First 24 bits are considered OUI; Remaining 24 bits are considered vendor assigned); LLC (WAN protocols; PPP; HDLC; Frame Relay); Example: Switch, bridge; PDU: FRAMES

Transport Layer

Layer 4 of the OSI reference model, used for reliable communication between end nodes over the network; provides mechanisms used for establishing, maintaining, and terminating virtual circuits, transport fault detection and recovery, and controlling the flow of information

Session Layer

Layer 5 of the OSI reference model, responsible for creating, managing, and terminating sessions between applications and overseeing data exchange between Presentation layer entities

Presentation Layer

Layer 6 of the OSI reference model, it defines how data is formatted, presented, encoded, and converted for use by software at the Application layer; only layer of the OSI that can actually change data

Application Layer

Layer 7 of the OSI reference network model, supplying services to application procedures (such as electronic mail or file transfer) that are outside the OSI model. This layer chooses and determines the availability of communicating partners along with the resources necessary to make the connection, coordinates partnering applications, and forms a consensus on procedures for controlling data integrity and error recovery.

Session

Layer responsible for dialog Control

Transport

Layer responsible for end-to-end connection. Also segments and reassembles data into a single data stream. TCP and UDP live here.

Data link

Layer responsible for framing

Network

Layer responsible for routing

F • Disable the wireless network when a vulnerability analysis is being performed.

Many best practices exist for wired and wireless network security. The list below has one item that is not a best practice. Identify the recommendation that is not a best practice for wired and wireless security. A • Periodically update anti-virus software. B • Be aware of normal network traffic patterns. C • Periodically update the host operating system. D • Activate the firewall on a Linksys integrated router. E • Configure login permissions on the integrated router. F • Disable the wireless network when a vulnerability analysis is being performed.

Dynamic NAT

Many to many mapping; one private host requires a public IP address obtained from a pool of available addresses; usually deployed at client end; easier from the perspective of scalability Configuration: router(config-if)# ip nat inside; router(config-if)# ip nat outside; router(config)# access-list <acl no> <permit|deny> <source-address> <wildcard mask>; router(config)#ip nat pool <name> <start-ip> <end-ip> netmask <subnet mask>; router(config)# ip nat inside source list <acl no> pool <name> Verification: Router# show ip nat translation

provides security on the console = router(config-line)# Password class displays a message when the router is accessed = router(config)# banner motd configures a name on the router = router(config)# hostname CL1

Match the commands to the correct actions. (Not all options are used.)

Setup Mode

Mode that a router will enter if no configuration is found in nonvolatile RAM when the router boots. Allows the administrator to configure a router step-by-step. Not as robust or flexible as the Command-Line Interface

Copper and fiber cabling. Ethernet, Fast Ethernet (FE), Gigabit Ethernet (GE), Token Ring, and fiber distributed data interface (FDDI).

Name 6 types of media used in a LAN.

"Hubs, bridges, switches, routers, firewalls, wireless access points, modems, NT1s (Network Terminator Type 1 is an ISDN network termination device), and channel service units/data service units (CSU/DSUs)."

Name 9 common network components.

PCs, file servers, hubs, bridges, switches, routers, multilayer switches, voice gateways, and firewalls.

Name 9 network devices commonly found in a LAN.

Analog dialup, asynchronous transfer mode (ATM), dedicated circuits, cable, digital subscriber line (DSL), Frame Relay, Integrated Services Digital Network (ISDN), Switched Multi-megabit Data Services (SMDS), and X.25

Name 9 services available via a WAN.

1) Small Office/Home Office (SOHO) - Home or small office with a handful of people. 2) Branch Office - Users are connected in a small area that is geographically separated from the corporate office. 3) Mobile Users - Can connect to the network from any location, LAN, or Wan. 4) Corporate or Central Office - Most of the network users and resources are located in one location.

Name and describe the 4 types of networking locations.

Flat Network

Network that is one large collision domain and one large broadcast domain

Network Layer

OSI Layer 3—the layer in which routing is implemented, enabling connections and path selection between two end systems

Network Layer

OSI Layer 3—the layer in which routing is implemented, enabling connections and path selection between two end systems; Routed protocol (Protocols that are used for identification; IP, IPX, AppleTalk); Routing protocol (Protocols that are used to find the routed protocols; EIGRP, OSPF, etc.); PDU: PACKETS

Transport Layer

OSI Layer 4; used for reliable communication between end nodes over the network; provides mechanisms used for establishing, maintaining, and terminating virtual circuits, transport fault detection and recovery, and controlling the flow of information Identifying services; TCP (Connection oriented; Reliable; Protocol number 6); UDP (Connectionless; Unreliable; Protocol number 17); Multiplexing and de-multiplexing; Fragmentation; Sequencing and reassembling; Windowing, buffering, congestion avoidance; Error correction; PDU: SEGMENTS

Presentation Layer

OSI Layer 6; defines how data is formatted, presented, encoded, and converted for use by software at the Application layer; Performs encryption within an application; Ensures that data is presented correctly to the application used; Performs translation of cross-platform standards that may be understood by the local machine: (Pict. into .jpg file translation; .wav into .mp3)

OSPF DR & BDR election

OSPF elects a DR (designated router) and a BDR (backup designated router) in broadcast and non-broadcast multi-access networks; DR is responsible for sending an update to the neighbors that are received from other neighbors; Special multicast address used for sending routing updates to DR/BDR: 224.0.0.6 | OSPF router with the highest priority becomes the DR; OSPF router with lower priority than DR becomes BDR; a BDR takes DR's if DR fails; other OSPF routers are known as DROTHERS; If OSPF priority hasn't been configured, highest router-id is referenced; OSPF router with highest router-id becomes DR; OSPF router with lower router-id than DR's becomes the BDR

Well-known Ports

(Ranges from 0 to 1023; Port numbers used by well-known services; Examples: HTTP(80), HTTPS(443), DNS(53), FTP(20,21), TELNET(23), etc.)

Wildcard Masks

0's mean match this, 1's ignore; if only want odd numbers, wildcard mask of 11111110 (4x) or 254.254.254.254

Switch

1) In networking, a device responsible for multiple functions such as filtering, flooding, and sending frames. It works using the destination address of individual frames; operate at the Data Link layer of the OSI model. 2) Broadly, any electronic/mechanical device allowing connections to be established as needed and terminated if no longer necessary; considered hardware based, bridges are software based

IPv6

128-bit addressing system; expressed in hexadecimal instead of decimal; colon ":" used to separate group of four-hex characters (a "word"); 4 bits = 1 hex character; IPv6 addresses are complex and not easy to write like IPv4; can be suppressed to minimize overhead (leading zeros in each word can be omitted; single set of consecutive zeroes can be replaced with double colon "::"; multiple double colons not allowed Configuration: router(config-if)# ipv6 address <address> / <prefix-length> <EUI-64>; router(config-if)# ipv6 address autoconfig <default>; router(config-if)# no shutdown IPv6 header - version; traffic class; flow label; payload length; next header; hop limit; source address; destination address IPv6 Static Routes - purpose is same ase IPv4 static routes; must supply destination prefix, mask and next-hop; router(config)# ipv6 route <destination-prefix/mask> <next-hop>; ex: Router(config)#ipv6 route 2001:2:3:4::/64 2001:aa:bb:cc::77 IPv6 Verification: router# show ipv6 interface brief; router# show ipv6 routers; router# show ipv6 route; router# debut ipv6 nd IPv6, Enabling: Router(config)# ipv6 unicast-routing - permits router to send ICMPv6 router advertisements; allows IPv6 routing between connected interfaces; allows operation of IPv6 routing protocols

Rapid STP (RSTP)

802.11w; Enhancement to legacy 802.1d STP; Designed to speed up convergence; Link type is derived from duplex mode; Full duplex link is considered as a P2P; Half duplex link is assumed to be shared

Configuration Register

A 16-bit configurable value stored in hardware or software that determines how Cisco routers function during initialization. In hardware, the bit position is set using a jumper. In software, it is set by specifying specific bit patterns used to set startup options, configured using a hexadecimal value with configuration commands

Subnet Mask

A 32-bit address mask used in IP to identify the bits of an IP address that are used for the subnet address. Using a mask, the router does not need to examine all 32 bits, only those selected by the mask

Inter Switch Link (ISL) Routing

A Cisco proprietary method of frame tagging in a switched internetwork. Frame tagging is a way to identify the VLAN membership of a frame as it traverses a switched internetwork

Media Access Control (MAC) Address

A Data-Link layer hardware address that every port or device needs in order to connect to a LAN segment. These addresses are used by various devices in the network for accurate location of logical addresses; defined by the IEEE standard and their length is six characters, typically using the burned-in address (BIA) of the local LAN interface. Variously called hardware address, physical address, burned-in address

Router

A Network-layer mechanism, either software or hardware, using one or more metrics to decide on the best path to use for transmission of network traffic. Sending packets between networks is based on the information provided on Network layers. Historically, this device has sometimes been called a gateway

A crossover cable is being used.

A PC is plugged into a switch and is unable to connect to the network. The UTP cable is suspected. What could be the problem?

Forward Explicit Congestion Notification (FECN)

A bit set by a Frame Relay network that informs the DTE receptor that congestion was encountered along the path from source to destination. A device receiving frames with this bit set can ask higher-priority protocols to take flow-control action as needed

Virtual Circuit

A logical circuit devised to assure reliable communication between two devices on a network. Defined by a virtual path connection (VPC)/virtual path identifier (VPI) pair, a [TERM] can be permanent (PVC) or switched (SVC). VCs are used in Frame Relay and X.25. Known as virtual channel in ATM

Frame

A logical unit of information sent by the Data Link layer over a transmission medium. The term often refers to the header and trailer, employed for synchronization and error control, that surround the data contained in the unit

Hop Count

A routing metric that calculates the distance between a source and a destination. RIP employs [TERM] as its sole metric

Access List

A set of test conditions kept by routers that determines "interesting traffic" to and from the router for various services on the network

Buffer

A storage area dedicated to handling data while in transit; used to receive/store sporadic deliveries of data bursts, usually received from faster devices, compensating for the variations in processing speed. Incoming information is stored until everything is received prior to sending data on.

C • It floods the frame out of all active ports, except the origination port.

A switch receives a frame with a destination MAC address that is currently not in the MAC table. What action does the switch perform? A • It drops the frame. B • It sends out an ARP request looking for the MAC address. C • It floods the frame out of all active ports, except the origination port. D • It returns the frame to the sender.

SVI

A technician configures a switch with these commands: SwitchA(config)# interface vlan 1 SwitchA(config-if)# ip address 192.168.1.1 255.255.255.0 SwitchA(config-if)# no shutdown What is the technician configuring?

ARP cache routing table

A technician is configuring a router that is actively running on the network. Suddenly, power to the router is lost. If the technician has not saved the configuration, which two types of information will be lost? (Choose two.)

Store-and-Forward Packet Switching

A technique in which the switch first copies each packet into its buffer and performs a cyclical redundancy check (CRC). If the packet is error-free, the switch then looks up the destination address in its filter table, determines the appropriate exit port, and sends the packet

Carrier Sense Multiple Access with Collision Detect (CSMA/CD)

A technology defined by the Ethernet IEEE 802.3 committee. Each device senses the cable for a digital signal before transmitting. Also allows all devices on the network to share the same cable, but one at a time. If two devices transmit at the same time, a frame collision will occur and a jamming pattern will be sent; the devices will stop transmitting, wait a predetermined amount of time, and then try to transmit again.

TCP

A user is viewing an HTML document located on a web server. What protocol segments the messages and manages the segments in the individual conversation between the web server and the web client?

the MAC address of the default gateway

A user sends an HTTP request to a web server on a remote network. During encapsulation for this request, what information is added to the address field of a frame to indicate the destination?

Portfast

Access Ports typically connect to hosts (Laptops/PCs, Servers); End users don't want to wait up to a minute to gain network connectivity; designed to speed up this process; When enabled on a port, it places port immediately into Forwarding state upon initial connection; Not to be used on VLAN Trunk ports unless there is certainty about lack-of-loops Configuration - (config-if)#spanning-tree portfast OR (config)#spanning-tree portfast default Verification - Switch#show spanning-tree interface <type/number> portfast

copy running-config startup-config

After troubleshooting a router, the network administrator wants to save the router configuration so that it will be used automatically the next time that the router reboots. What command should be issued?

Network Address Translation (NAT)

An algorithm instrumental in minimizing the requirement for globally unique IP addresses, permitting an organization whose addresses are not all globally unique to connect to the Internet, regardless, by translating those addresses into globally routable address space; Separates LAN from WAN and provides accessibility to the outside world; Translates RFC1918 space addresses into public addresses; Provides security; Helps reduce public IP address consumption; Hides private addresses from outsiders

Local Management Interface (LMI)

An enhancement to the original Frame Relay specification. Among the features it provides are a keepalive mechanism, a multicast mechanism, global addressing, and a status mechanism

B • switch E • wireless access point

An integrated router can normally perform the functions of which two other network devices? (Choose two.) A • NIC B • switch C • e-mail server D • application server E • wireless access point

Interior Gateway Protocol (IGP)

Any protocol used by the Internet to exchange routing data within an independent system Typically works within the Autonomous System; Can be categorized into three sections: Distance vector (Elects shortest path based on the total metric of a route; Visibility of network topology limited; Ex: IGRP, RIPv1/v2); Link state (Elects shortest path based on the link cost; Complete visibility to network topology; Ex: OSPF, IS-IS); Hybrid (Combines features of distance vector and link state; Ex: EIGRP)

access-class

Applies a standard IP access list to a VTY line

Decapsulation

As each layer receives a PDU from the layer below it, headers are inspected and then removed.

Public Addresses

At least one public address is required for a private host to communicate to the Internet; globally routable; Globally unique; Should be purchased; Usually used in Internet edge; Range of public addresses: Beyond the RFC 1918 space, all addresses are public

Network layer

At which layer of the OSI model would a logical address be encapsulated?

Octet

Base-8 numbering system used to identify a section of a dotted decimal IP address. Also referred to as a byte

cdp timer

Changes the CDP update timer

Per-VLAN Spanning Tree (PVST)

Cisco Default; Number of STP instances depends on number of VLANs; Effective where load sharing is required; BPDU is sent for each VLAN; Rapid convergence; Both the encapsulations ISL and IEEE 802.1Q are supported; Consumes resources because of control traffic overhead Verification - Switch# show spanning-tree; Switch# show spanning-tree vlan<vlan-id>; Switch# show spanning-tree root; Switch# show spanning-tree blocked ports Configuring port cost and port priority per VLAN - Switch(config-if)# spanning-tree vlan<vlan-id> port-priority <priority>; Switch(config-if)# spanning-tree vlan<vlan-id> cost <cost> Configuring priority per VLAN - Switch(config)# spanning-tree vlan<vlan-id> priority <priority>; Switch(config)# spanning-tree vlan<vlan-id> root primary; Switch(config)# spanning-tree vlan<vlan-id> root secondary

Cisco Discovery Protocol (CDP)

Cisco's proprietary protocol that is used to tell a neighbor Cisco device about the type of hardware, software version, and active interfaces that the Cisco device is using. It uses a SNAP frame between devices and is not routable; Layer 2 protocol for neighbor discovery; Provides information of platform, interface, IP; address, and OS version; Equivalent to the open standard LLDP; Helps with preparing network diagram Enabling CDP: Router(config)# cdprun, Router(config)# cdptimer <seconds> Disabling CDP: Router(config)# no cdprun, Router(config-if)#no cdpenable Verifying CDP: Router# show cdpneighbor, Router# show cdpneighbor < interface>, Router# show cdpneighbor <interface> detail

clear counters

Clears the statistics from an interface

A • encrypt; authenticate users on

Complete the following sentence: WEP is used to ______ , and EAP is used to _____ wireless networks. A • encrypt; authenticate users on B • filter traffic; select the operating frequency for C • identify the wireless network; compress data on D • create the smallest wireless network; limit the number of users on

Moves forward one character

Ctrl+F

Redisplays a line

Ctrl+R

Returns you to the originating router when you telnet to numerous routers

Ctrl+Shift+6, then X (keyboard combination)

Erases a line

Ctrl+U

Erases a word

Ctrl+W

Ends configuration mode and returns to EXEC

Ctrl+Z

Administrative Distance (AD)

Defines trustworthiness of a routing protocol; 8-bit numbering system; Ranges from 0 through 255

State Transitions

Digital signaling scheme that reads the "state" of the digital signal in the middle of the bit cell. If it is five volts, the cell is read as a one. If the state of the digital signal is zero volts, the bit cell is read as a zero

B • by phone

During a pretexting event, how is a target typically contacted? A • by e-mail B • by phone C • in person D • through another person

Subnetting (in IPv4)

Each IP network that is purchased is only good for a single broadcast domain (VLAN); Often unused/unallocated host space within a given network; Subnetting = Dividing a single, allocated network into multiple sub-networks; Minor loss of available hosts addresses; Every device running IPv4 uses the same process to determine its local network: (Identify local IP address in binary, Identify local subnet mask in binary, Extract network portion of address by comparing current address and subnet mask); Subnet mask is referenced instead of classfull network address; (2^h)-2 = hosts per subnet

Physical Layer

Electrical signals carried over the physical layer; Devices used at the physical layer (Hubs; Repeaters; Network interface cards (NICs); Cables (Ethernet, fiber-optic, serial, etc.)) PDU: BITS

Flash

Electronically Erasable Programmable Read-Only Memory (EEPROM) is this type of memory; Used to hold the Cisco IOS in a router by default

Framing

Encapsulation at the Data Link layer of the OSI model is called [TERM] because the packet is encapsulated with both a header and a trailer

Deletes the startup-config

Erase startup

Moves back one word

Esc+B

Moves forward one word

Esc+F

10Base2 and 10Base5

Ethernet __________ has/have both a physical and logical bus topology.

E1

European, 30-DS0s at 2.048 Mbps

Sets the timeout in seconds and minutes for the console connection

Exec-timeout

ROM

Fill in the blank. In a router,________ is the nonvolatile memory where the diagnostic software, the bootup instructions, and a limited IOS are stored.

Extended ACL

Filters traffic based on layer 3 and layer 4 header; source and destination IP and port numbers are checked; ACL numbers range from 100-199; should be applied nearest to source; capable of transport header inspection

Windowing

Flow-control method used with TCP at the Transport layer of the OSI model

First Hop Redundancy Protocols (FHRP)

Generic term for any protocol that provides redundancy for client default gateway; cisco proprietary (HSRP; HSRPv2; GLBP, gateway load balancing protocol); standardized IETF, VRRP common characteristics - require two or more routers; hello's/keepalives exchanged between routers; one router elected as the active router for clients; sub-second failover; routers share a "virtual IP" and "Virtual MAC"

ATM and SMDS.

Give 2 examples of cell-switched services.

Analog dial-up and ISDN.

Give 2 examples of circuit-switched services.

Frame Relay and X.25.

Give 2 examples of packet-switched services.

Fiber distributed data interface (FDDI).

Give an example of a media technology that uses dual rings to connect computer components.

Diagnostics can be run without a technician being present at the site.

How does remote-access software help in the troubleshooting process?

The MTU is passed to the network layer by the data link layer Refer to curriculum topic: 6.1.2 The data link layer indicates to the network layer the MTU for the medium that is being used. The network layer uses that information to determine how large the packet can be when it is forwarded. When packets are received on one medium and forwarded on a medium with a smaller MTU, the network layer device can fragment the packet to accommodate the smaller size.

How does the network layer use the MTU value?

Extended IPX Access List

IPX access list that filters the network by logical IPX address, protocol field in the Network layer header, or even socket number in the Transport layer header

Standard IPX Access List

IPX access list that uses only the source and destination IPX address to filter a network

S Reference Point

ISDN reference point that works with a T reference point to convert a 4-wire ISDN network to the 2-wire ISDN network needed to communicate with the ISDN switches at the network provider

Connection ID

Identifications given to each Telnet session into a router. The show sessions command will give you the connections a local router will have to a remote router. The show users command will show the connection IDs of users telnetted into your local router

B • vishing C • phishing E • pretexting

Identify three techniques used in social engineering. (Choose three.) A • fishing B • vishing C • phishing D • spamming E • pretexting F • junk mailing

An application that allows you to access and use resources that are not located on your local computer.

In a network, what is a "network-aware" application?

Customer Premises Equipment (CPE)

Items such as telephones, modems, and terminals installed at customer locations and connected to the telephone company network

FragmentFree

LAN switch type that reads into the data section of a frame to make sure fragmentation did not occur; looks at the first 64 bytes of a frame to make sure a collision has not occurred. It is sometimes referred to as modified cutthrough; default for 1900 switches

Router LSA

LSA Type-1; describes the state of connected links; bits to indicate special capabilities of router (ABR, ASBR); confined to local area only

Network LSA

LSA Type-2; only created by designated routers; describes (all adjacent neighbors of DR, subnet mask of link); confined to local area only

Summary LSA

LSA Type-3; describes summarized info of links from one area into an adjacent area; created by ABRs; confined to local area only, but other ABRs may modify and continue to forward

Data Link Layer

Layer 2 of the OSI reference model, it ensures the trustworthy transmission of data across a physical link and is primarily concerned with physical addressing, line discipline, network topology, error notification, ordered delivery of frames, and flow control. The IEEE has further segmented this layer into the MAC sublayer and the LLC sublayer. Also known as the Link layer. Can be compared somewhat to the Data Link control layer of the SNA model

Application

Layer responsible for File, print, message, database, and application services.

Physical

Layer were media exists

Puts you in the auxiliary interface configuration mode

Line aux

Puts you in console configuration mode

Line console 0

Puts you in VTY (Telnet) interface configuration mode

Line vty

Trunk Link

Link used between switches and from some servers to the switches; carry info about many VLANs. (Access links are used to connect host devices to a switch and carry only VLAN information that the device is a member of)

Stops console messages from overwriting your command-line input

Logging synchronous

Host Address

Logical address configured by an administrator or server on a device. Logically identifies this device on an internetwork

Neighbor Discovery Protocol (NDP)

Makes use of new ICMPv6 message types (neighbor solicitation; neighbor advertisement; router solicitation; router advertisement)

Distribution Layer

Middle layer of the Cisco three-layer hierarchical model, which helps you design, install, and maintain Cisco hierarchical networks; the point where access layer devices connect. Routing is performed at this layer.

It uses a shared logical bus topology, so if there are more customers, each customers gets less bandwidth. It is also more susceptible to security risks.

Name 2 major disadvantages of Cable access.

Simple Mail Transfer Protocol (SMTP), Internet Message Access Protocol version 4 (IMAP4), Post Office Protocol 3 (POP3), File Transfer Protocol (FTP), and Hypertext Transfer Protocol (HTTP)

Name 5 common network protocols.

Session Layer

OSI Layer 5; responsible for creating, managing, and terminating sessions between applications and overseeing data exchange between Presentation layer entities; Helps establish session with reserved port numbers; Session identifier is assigned; Tracks connections between hosts and remote computers/servers; Well-known ports (Ranges from 0 to 1023; Port numbers used by well-known services; Examples: HTTP(80), HTTPS(443), DNS(53), FTP(20,21), TELNET(23), etc.); Registered ports (Reserved for the applications; Ranges from 1024 to 65535); Ephemeral ports

Applications Layer

OSI Layer 7; Interacts with the user applications (Firefox, Outlook, etc.); Provides initial network connection for user applications; Manages the application connections between hosts

Collision Domain

One device sends a packet on a network segment and every other device on the same segment is forced to process it.

Access Layer

One of the layers in Cisco's three-layer hierarchical model; provides users with access to the internetwork; where users gain access to the network and where Cisco recommends users plug into switches, which break up collision domains; switches are used to break up Ethernet networks at this layer

Multicast

One to a group

Check the workstation TCP/IP configuration.

Only one workstation on a particular network cannot reach the Internet. What is the first troubleshooting step if the divide-and-conquer method is being used?

The address was obtained from a DHCP server.

Open the PT ActivityView in a new window. Perform the tasks in the activity instructions and then answer the question or complete the task. How does PC0 obtain its IP address?

Dedicated Leased Lines

P2P; always up; up to 45 Mbps; uses PPP or HDLC

Link Control Protocol (LCP)

PPP must negotiate a connection; moves through a series of req'd steps prior to transport of user data; LCP designed to establish, configure, and test data link connections for use by PPP authentication; state events and transitions can be monitored in real-time with "debug ppp negotiations"

IOS Initial Configuration Commands

Prevent syslog & event messages from interrupting CLI input: Router(config-line)# logging synchronous Prevent DNS resolution attempt for mis-typed commands: Router(config)# no ipdomain-lookup Configure descriptive device name: Router(config)# hostname Lab-1-Rtr Configure informative banner: Router(config)# banner motd Add IPv4 address to an interface: Router(config-if)#ipaddress <address><mask>; Router(config-if)# no shutdown

Frame

Protocol Data Unit encapsulation at the Data Link layer of the OSI reference model. Encapsulates packets from the Network layer and prepares the data for transmission on a network medium.

Address Resolution Protocol (ARP)

Protocol that traces IP addresses to MAC addresses Used to resolve Layer-2 address of hosts on same LAN; Broadcast-based; Proxy ARP (Optional feature on routers and Wi-Fi access points; Router replies on behalf of hosts)

show ip interface brief

Refer to the exhibit. Fill in the blank. Do not use abbreviations. What command does a technician issue on a switch to display the exhibited output?

3

Refer to the exhibit. Fill in the blank. A packet leaving PC-1 has to traverse _____ hops to reach PC-4.​

U Reference Point

Reference point between a TE1 and an ISDN network. This type of reference point understands ISDN signaling techniques and uses a 2-wire connection

Classless Routing

Routing that sends subnet mask information in the routing updates. This type of routing allows Variable-Length Subnet Mask (VLSM) and supernetting. Routing protocols that support this routing are RIP version 2, EIGRP, and OSPF

IOS Saving and Deleting Configurations

Save current Running Configuration: Router# copy running-configstartup-config OR Router# write memory Setting a router back to factory defaults: Step-1: Delete startup configuration: Router# erase startup-config OR Router# write erase; Step-2: Reload the router: Router# reload

Encrypts the user mode and enable password

Service password-encryption

Bandwidth

Sets the bandwidth on a serial interface

Shows the DTE or DCE status of an interface

Show controllers s 0

Shows the statistics of interface serial 0

Show interface s0

RIP next generation (RIPng)

Similarities with RIPv2 for IPv4 (distance-vector, radius of 15 hops, split horizon); IPv6 prefix, next-hope IPv6 address; uses the multicast group FF02::9, the all-rip-routers multicast group, as the destination address for RIP updates; can create multiple, named, RIP processes within a single router RIPng Verification: router# show ipv6 rip database; router# show ipv6 route rip; router# show ipv6 protocols RIPng, enabling: router(config)# ipv6 unicast routing; router(config-if)# ipv6 rip <name> enable RIPng, options: router(config)# ipv6 router rip <name> (redistribution, route filtering, changing of default values, etc.)

Binding

Software that maps to another layers' protocols and is specifically designed to be deployed there will handle additional functions.

Any

Specifies any host or any network; same as the 0.0.0.0 255.255.255.255 command

Challenge Authentication Protocol (CHAP)

Supported on lines using PPP encapsulation, it is a security feature that identifies the remote end, helping keep out unauthorized users. After it is performed, the router or access server determines whether a given user is permitted access. It is a newer, more secure protocol than PAP

Switch Fabric

Term used to identify a layer-2 switched internetwork with many switches

Changes your history size from the default of 10 up to 256

Terminal history size

Basic Rate Interface

The ISDN interface that facilitates circuit-switched communication between video, data, and voice; it is made up of two B channels (64Kbps each) and one D channel (16Kbps)

Basic Rate Interface (BRI)

The ISDN interface that facilitates circuit-switched communication between video, data, and voice; it is made up of two B channels (64Kbps each) and one D channel (16Kbps).

Nondesignated Port

The Spanning-Tree Protocol tells a port on a layer-2 switch to stop transmitting and creating a network loop. Only designated ports can send frames

Spanning-Tree Protocol (STP)

The bridge protocol (IEEE 802.1d) that enables a learning bridge to dynamically avoid loops in the network topology by creating a spanning tree using the spanning-tree algorithm. Spanning-tree frames called bridge protocol data units (BPDUs) are sent and received by all switches in the network at regular intervals. The switches participating in the spanning tree don't forward the frames; instead, they're processed to determine the spanning-tree topology itself. Cisco Catalyst series switches use STP 802.1d to perform this function

Half Duplex

The capacity to transfer data in only one direction at a time between a sending unit and receiving unit

Full Duplex

The capacity to transmit information between a sending station and a receiving unit at the same time

Auxiliary Port

The console port on the back of Cisco routers that allows you to dial the router and make console configuration settings

Protocol Data Unit (PDU)

The final, structured data unit created by an OSI Layer; PDUs created at one layer are meant to be read by the same layer on receiving device

Cisco Internetwork Operating System (IOS)

The kernel of the Cisco line of routers and switches that supplies shared functionality, scalability, and security for all products under its CiscoFusion architecture

Central Office (CO)

The local telephone company office where all loops in a certain area connect and where circuit switching of subscriber lines occurs

Physical Layer

The lowest layer—Layer 1—in the OSI reference model, it is responsible for converting data packets from the Data Link layer (Layer 2) into electrical signals; this layer's protocols and standards define, for example, the type of cable and connectors to be used, including their pin assignments and the encoding scheme for signaling 0 and 1 values

Simplex

The mode at which data or a digital signal is transmitted; this is a way of transmitting in only one direction

Collision Domain

The network area in Ethernet over which frames that have collided will spread. Collisions are propagated by hubs and repeaters, but not by LAN switches, routers, or bridges

Demarcation (demarc)

The point between the customer premises equipment (CPE) and the telco's carrier equipment, where the telco's responsibility ends, and the customer's begins

Point-to-Point Protocol (PPP)

The protocol most commonly used for dialup Internet access, superseding the earlier SLIP. Its features include address notification, authentication via CHAP or PAP, support for multiple protocols, and link monitoring. It has two layers: the Link Control Protocol (LCP) establishes, configures, and tests a link; and then any of various Network Control Programs (NCPs) transport traffic for a specific protocol suite, such as IPX.

Broadcast Domain

The set of all devices on a network segment which are allowed to "hear" all broadcasts sent to that specific segment.

Telnet

The standard terminal emulation protocol within the TCP/IP protocol stack. Method of remote terminal connection, enabling users to log in on remote networks and use those resources as if they were locally connected; defined in RFC 854

Holddown

The state a route is placed in so that routers can neither advertise the route nor accept advertisements about it for a defined time period; used to surface bad information about a route from all routers in the network. A route is generally placed in [TERM] when one of its links fails

Encapsulation

The technique used by layered protocols in which a layer adds header information to the protocol data unit (PDU) from the layer above. As an example, in Internet terminology, a packet would contain a header from the Physical layer, followed by a header from the Network layer (IP), followed by a header from the Transport layer (TCP), followed by the application protocol data

Link-Local Addresses

These addresses are assigned automatically as an IPv6 host comes online; similar to the 169.254.x.x address of IPv4; always begin with FE80::/10; last 64 bits is the 48-bit MAC address with FFFE inserted in the middle

Terminal Equipment 2 (TE2)

These devices do not understand ISDN signaling techniques, and a terminal adapter must be used to convert the signaling

Poison Reverse Updates

These update messages are transmitted by a router back to the originator (thus ignoring the split-horizon rule) after route poisoning has occurred. Typically used with DV routing protocols in order to overcome large routing loops and offer explicit information when a subnet or network is not accessible (instead of merely suggesting that the network is unreachable by not including it in updates)

IP Address

This is an address uniquely identifying any device (host) on the Internet (or any TCP/IP network). Each address consists of four octets (32 bits), represented as decimal numbers separated by periods (a format known as "dotted-decimal"). Every address is made up of a network number, an optional subnetwork number, and a host number. The network and subnetwork numbers together are used for routing, while the host number addresses an individual host within the network or subnetwork. The network and subnetwork information is extracted from the IP address using the subnet mask. There are five classes of IP addresses (A-E), which allocate different numbers of bits to the network, subnetwork, and host portions of the address

Backward Explicit Congestion Notification/BECN

This is the bit set by a Frame Relay network in frames moving away from frames headed into a congested path. A DTE that receives frames with [TERM] may ask higher-level protocols to take necessary flow control measures

Tab

To save time, IOS commands may be partially entered and then completed by typing which key or key combination?

C • internal

To which part of the network does the wireless access point part of a Linksys integrated router connect? A • DMZ B • external C • internal D • a network other than the wired network

True

True or False, each port on a switch is its own collision domain.

True

True or False, only routers break up broadcast domains by default.

Random Access Memory (RAM)

Type of computer memory that can be accessed randomly; that is, any byte of memory can be accessed without touching the preceding bytes; Used by all computers to store information. Cisco routers use [TERM] to store packet buffers and routing tables, along with the hardware addresses cache

ASBR-Summary LSA

Type-4; Autonomous System Boundary Router: An area border router placed between an OSPF autonomous system and a non-OSPF network that operates both OSPF and an additional routing protocol, such as RIP. ASBRs must be located in a non-stub OSPF area; advertises the ASBR into remote areas; created by ABRs; allows routers that are not in same area as ASBR to forward traffic to it

External LSA

Type-5; advertises non-OSPF routes into OSPF; created by ASBRs; propagated throughout entire OSPF domain

Console Port

Typically an RJ-45 port on a Cisco router and switch that allows Command-Line Interface capability

Boot ROM

Used in routers to put the router into bootstrap mode. Bootstrap mode then boots the device with an operating system. The ROM can also hold a small Cisco IOS

Extended Setup

Used in setup mode to configure the router with more detail than Basic Setup mode. Allows multiple-protocol support and interface configuration

Node Address

Used to identify a specific device in an internetwork. Can be a hardware address, which is burned into the network interface card or a logical network address, which an administrator or server assigns to the node

BPDU Guard

Usually configured on access ports that lead to hosts; If any BPDU is seen, port goes into err-disabled state Configuration - (config-if)#spanning-tree bpduguard enable; (config)#spanning-tree portfast bpduguard default

Passive

What class of attack monitors unencrypted traffic, looking for such things as clear-text passwords?

a large corporate environment

What environment would be best suited for a two-firewall network design?

Adversary

What general security term is used to describe a person interested in attacking your network?

to display the host routing table Refer to curriculum topic: 6.2.1 The command netstat -r displays the host routing table to verify the routes and costs that a computer uses to communicate to certain networks.

What is the command netstat -r used for?

Ethernet.

What is the de facto standard for LAN-based networks?

DNS server

What resolves a website URL to an IP address?

local delivery

What type of delivery uses data link layer addresses?

ipconfig /renew

Which ipconfig command requests IP configuration from a DHCP server?

bottom-up

Which troubleshooting method begins by examining cable connections and wiring issues?

A. dash D. numbers

Which two characters are allowed as part of the hostname of a Cisco device? (Choose two.) A. dash B. space C. tab D. numbers E. question mark

Any host or user can get a public IPv6 network address because the number of available IPv6 addresses is extremely large.​

Why is NAT not needed in IPv6?​

to add a password to a Cisco network device

Why would a network administrator use the CLI of the Cisco IOS?

Gateway Load Balancing Protocol (GLBP)

cisco proprietary; provides gateway redundance AND per-host load balancing; AVG (active virtual gateway) in charge of determining host-to-gateway allocations; configured similarly to HSRP

IPv4

classes: A (0.0.0.0 through 127.255.255.255); B: (128.0.0.0 through 191.255.255.255); C: (192.0.0.0 through 223.255.255.255); D: (224.0.0.0 through 239.255.255.255); E: (240.0.0.0 through 255.255.255.255); 127 ranges are considered as loopbacks; 169.254 ranges are considered as APIPA; IP addresses "leased" to a corporation are known as public IP addresses; IP addresses that are unregistered and may overlap from one company to the next, are known as private IP addresses configuration: Router(config-if)# ip address <address><mask>; Verification: Show interface <type><number>, Show ip interface brief

Clears a connection connected via Telnet to your router

clear line

Provides clocking on a serial DCE interface

clock rate

IOS Command Structure

command hierarchy: Router>-User (or EXEC) mode; Router#-Privileged EXEC (or Enable) mode; Configuration modes: Router(config)# -Global Configuration Mode; Router(config-if)# -Interface Configuration Mode; Router(config-router)# -Router Configuration Mode; Usage of Exit, End, Ctrl-Z

Copies a configuration stored on a TFTP host to running-config

config network

Puts you in global configuration mode and changes the runningconfig

config terminal

Tells the router how to boot and to change the configuration register setting

config-register

User Datagram Protocol (UDP)

connectionless Transport layer protocol in the TCP/IP protocol stack that simply allows datagrams to be exchanged without acknowledgements or delivery guarantees, requiring other protocols to handle error processing and retransmission. UDP is defined in RFC 768 connectionless; Unreliable; Protocol number 17

Copies a file from flash memory to a TFTP host

copy flash tftp

Copies the running-config file to the startup-config file; Short for copy running-config startup-config. Places a configuration into NVRAM

copy run start

Copies the running-config file to a TFTP host

copy run tftp

Copies a file from a TFTP host to flash memory

copy tftp flash

Copies a configuration from a TFTP host to the running-config file

copy tftp run

Shows you the call setup and teardown procedures

debug dialer

Shows the lmi exchanges between the router and the Frame Relay switch

debug frame-relay lmi

Provides a summary of the IGRP routing information running on the network

debug ip igrp events

Shows message requests from neighbor routers asking for an update and the broadcasts sent from your router to that neighbor router

debug ip igrp transactions

Sends console messages displaying information about RIP packets being sent and received on a router interface

debug ip rip

Shows the RIP and SAP information as it passes through the router

debug ipx

Shows layer-2 processes

debug isdn q921

Shows layer-3 processes

debug isdn q931

Deletes the contents of NVRAM on a 1900 switch

delete nvram

Tells the BRI line when to drop if no interesting traffic is found

dialer idle-timeout number

Specifies interesting traffic for a DDR link

dialer list number protocol protocol permit/deny

Sets the parameters that describe when the second BRI comes up on a ISDN link

dialer load-threshold number inbound/outbound/either

Used instead of a dialer string to provide more security in an ISDN network

dialer map protocol address name hostname number

Sets the phone number to dial for a BRI interface

dialer-string

Takes you from privileged mode back to user mode

disable

Disconnects a connection to a remote router from the originating router

disconnect

Puts you into privileged mode

enable

Sets the unencrypted enable password

enable password

Sets the encrypted enable secret password. Supersedes the enable password if set

enable secret

Sets the frame type used on an interface

encapsulation

Changes the encapsulation to Frame Relay on a serial link

encapsulation frame-relay

Sets the encapsulation type to the Internet Engineering Task Force (IETF). Connects Cisco routers to off-brand routers

encapsulation frame-relay ietf

Restores the default encapsulation of HDLC on a serial link

encapsulation hdlc

Changes the encapsulation on a serial link to PPP

encapsulation ppp

Deletes the contents of NVRAM on a router

erase startup-config

Disconnects a connection to a remote router via Telnet

exit

Sets the name of a router

hostname

Creates a subinterface

int e0.10

Puts you in interface configuration mode. Also used with show commands

interface

Turns on DNS lookup (which is on by default)

ip domain-lookup

Appends a domain name to a DNS lookup

ip domain-name

Creates a host table on a router

ip host

Sets the IP address of up to six DNS servers

ip name-server

Creates static and default routes on a router

ip route

Applies an IPX access list to an interface

ipx access-group

Applies an inbound IPX SAP filter to an interface

ipx input-sap-filter

Assigns an IPX network number to an interface

ipx network

Applies an outbound IPX SAP filter to an interface

ipx output-sap-filter

Is a Packet Internet Groper used to test IPX packet on an internetwork

ipx ping

Turns on IPX routing

ipx routing

Sets the number that identifies the first DS0 to the ISDN switch

isdn spid1

Sets the number that identifies the second DS0 to the ISDN switch

isdn spid2

Logs you out of your console session

logout

Sets the hardware media type on an interface

media-type

Frame Relay

multipoint technology; legacy tech typically used in service provider end; layer-2 specification; uses same pair of telephone wires for last mile; data placed into frame relay headers; utilizes PVCs (permanent virtual circuits); ATM typically used in core Frame Relay header - 8 bit flag, 16 bit address; variable data; 16 bit FCS; 8 bit flag; 16 bit address breakdown: byte 1 includes DLCI, CIR, EA and byte 2 has DLCI, FECN, BECN, DE and EA Frame relay Multipoint Configuration commands: router(config-if)# encapsulation frame-relay; router(config-if)# ip address <address> <subnet mask>; router(config-if)# end Frame Relay Verification - router# show frame-relay pvc; router# show frame-relay map

Switch

multiport bridge (more ports than a bridge; Mixture of port speeds & types); Forwards frames based on the MAC address table; Separates collision domain; Operates in data link layer; 1) In networking, a device responsible for multiple functions such as filtering, flooding, and sending frames. It works using the destination address of individual frames. Switches operate at the Data Link layer of the OSI model. 2) Broadly, any electronic/mechanical device allowing connections to be established as needed and terminated if no longer necessary

Tells the routing protocol what network to advertise

network

Turns off CDP on an individual interface

no cdp enable

Turns off CDP completely on a router

no cdp run

Turns off the dynamic IARP used with Frame Relay. Static mappings must be configured

no inverse-arp

Turns off DNS lookup

no ip domain-lookup

Removes a hostname from a host table

no ip host

Removes a static or default route

no ip route

Turns on an interface

no shutdown

Tests IP connectivity to remote device

ping

Tells PPP to use CHAP authentication

ppp authentication chap

Tells PPP to use PAP authentication

ppp authentication pap

EIGRP External

route that was previously learned via some non-EIGRP method and injected into EIGRP with "redistribute" command; admin distance = 170

Turns on IP IGRP routing on a router

router igrp as

Adds a second IPX network on the same physical interface

secondary

Shows all the access lists configured on the router

show access-list

Shows only access-list 110

show access-list 110

Displays the CDP timer and holdtime frequencies

show cdp

Same as show cdp neighbor detail, but does not work on a 1900 switch

show cdp entry *

Shows the individual interfaces enabled with CDP

show cdp interface

Shows the CDP packets sent and received on a device and any errors

show cdp traffic

shows the number of times the dialer string has been reached, the idle-timeout values of each B channel, the length of call, and the name of the router to which the interface is connected

show dialer

Shows the files in flash memory

show flash

Sets the LMI type on a serial interface

show frame-relay lmi

Shows the static and dynamic Network layer-to-PVC mappings

show frame-relay map

Shows the configured PVCs and DLCI numbers configured on a router

show frame-relay pvc

Shows you the last 10 commands entered by default

show history

Shows the contents of the host table

show hosts

Shows only the IP access lists

show ip access-list

Shows which interfaces have IP access lists applied

show ip interface

Shows the routing protocols and timers associated with each routing protocol configured on a router

show ip protocols

Displays the IP routing table

show ip route

Shows your connections via Telnet to remote devices

show sessions

Displays the startup-config file; Short for show startup-config. Shows the backup configuration stored in NVRAM

show start

Shows you your configured history size

show terminal

Displays the IOS type and version as well as the configuration register

show version

Puts an interface in administratively-down mode

shutdown

Finishes typing a command for you

tab

Connects, views, and runs programs on a remote device; tests IP connectivity and configures a router

telnet

Creates a TFTP-server host for a router system image that is run in flash

tftp-server system ios-name

Tests a connection to a remote device and shows the path it took through the internetwork to find the remote device; Tests IP connectivity

trace

Tells the IGRP routing protocol to share links inversely proportional to the metrics

traffic-share balanced

Tells the IGRP routing process to use routes that have only minimum costs

traffic-share min

Optical Carriers (OCs)

use fiber optics; 3 bundled DS3/T3's at 155.52 Mbps

Creates usernames and passwords for authentication on a Cisco router

username name password password

Digital Subscriber Line (DSL)

uses same pair of telephone wires to deliver voice and data; slower than cable; uses different frequencies to separate voice/data

Controls the load balancing between the best metric and the worst acceptable metric

variance

192.168.1.1

what IP address would computers use as their default gateway when on a local wireless network using DHCP Configurtion?

Enhanced interior Gateway Routing Protocol (EIGRP)

Open standard; Hybrid IGP (characteristics of both Link State and Distance Vector); metric based from link bandwidth & delay; supports manual and automatic summarization; supports MD5 authentication; supports unequal cost load-balancing; Distance is the metric EIGRP uses, gotten from formula; hello's go out every 10 seconds Authentication - Supports MD5 authentication; Uses a combination of key-chain and key-string with authentication password; More secure than plain-text authentication; Can be used with multiple time-based key-chains; Router# debug eigrppackets Authentication, configuration - Global: Router(config)# key-chain <name>; Router(config-keychain)# key <key-id>; Router(config-keychain-key)# key-string <password>; Router(config-keychain-key)# send-lifetime <duration>; Router(config-keychain-key)# accept-lifetime <duration>; Router(config-keychain-key)# end; Interface: Router(config-if)# ipauthentication eigrp<AS-Number> mode md5, Router(config-if)# ipauthentication key-chain eigrp<AS-Number> <key-chain name> Configuration commands: router(config)# router eigrp <AS-number>; router(config-router)# no auto-summary; router(config-router)# network <network-id>; router(config-router)# end; AS number should match between EIGRP routers

Dynamic Host Configuration Protocol (DHCP)

Operates in application layer; provides dynamic method of leasing an IP address to host; uses UDP ports 67/68; can be useful for a small network where a dedicated DHCP server is not available (configuring router as DHCP server) Configuration - router(config)# service dhcp; router(config)# ip dhcp pool <pool-name>; router(config-dhcp)# network <network-id>; router(config-dhcp)# default-router <default gateway>; router(config-dhcp)#dns-server <dns-server address>; router(config-dhcp)# lease <duration>; router(config-dhcp)#end Exclude list: router(config)# ip dhcp excluded-address <start-ip> <end-ip> Verification: router# show ip dhcp binding

Class B Network

Part of the Internet Protocol hierarchical addressing scheme. Class B networks have 16 bits for defining networks and 16 bits for defining hosts on each network

Class C Network

Part of the Internet Protocol hierarchical addressing scheme; have 24 bits for defining networks and only 8 bits for defining hosts on each network

Class A Network

Part of the Internet Protocol hierarchical addressing scheme; have only 8 bits for defining networks and 24 bits for defining hosts on each network

B. VTY interface C. privileged EXEC mode E. console interface

Passwords can be used to restrict access to all or parts of the Cisco IOS. Select the modes and interfaces that can be protected with passwords. (Choose three.) A. boot IOS mode B. VTY interface C. privileged EXEC mode D. Ethernet interface E. console interface F. router configuration mode

Hubs

Physical-layer devices that are really just multiple port repeaters. When an electronic digital signal is received on a port, the signal is reamplified or regenerated and forwarded out all segments except the segment from which the signal was received

IP Routing

Process of forwarding packets between networks; Basic components needed to route include Routable Packet (IPv4, IPv6, etc), Network address, Subnet mask, Next Hop, Metric; Types of routes include connected, static and dynamic; Router will only use routes with reachable "next hops"; Routers will only use the "best" routes; Routes must be "believable" (how do I know this route is still good?); Router will only accept routes that match its own, active protocols (No IPv6 routes accepted if router not an IPv6 host)

B • It reassembles the frame with different MAC addresses than the original frame.

Refer to the graphic. What does the router do after it determines that a data packet from Network 1 should be forwarded to Network 2? A • It sends the data packet as it was received. B • It reassembles the frame with different MAC addresses than the original frame. C • It reassembles the data packet with different IP addresses than the original data packet. D • It reassembles both the packet and the frame with different destination IP and MAC addresses.

Registered ports

Reserved for the applications; Ranges from 1024 to 65535

Internet Protocol version 4

Resides at OSI Layer-3 (Network Layer); Connectionless; 32-bit addressing system; Logical address for a network defined by IANA; these addresses are comprised of 4 octets; Dotted decimal notation is used to segment the octet

EIGRP Internal

Route that was originated within Autonomous System with the "network" command; admin distance = 90

Puts you in router rip configuration mode; Turns on IP RIP routing on a router

Router rip

EIGRPv6

Similarities to IPv4 EIGRP: most packets transmitted via multicast; same metric formula; utilizes same msg types (hello, update, ack, etc); uniqueness of EIGRPv6: packets sent to FF02::A; peers w/ link-local address of neighbors; next-hop address is link-local of peer Verification - Router# show ipv6 eigrp neighbor; Router# show ipv6 eigrp topology; Router# show ipv6 route eigrp; Router# show ipv6 protocols EIGRPv6, applying: router(config-if)# ipv6 eigrp <number> EIGRPv6, enabling: router(config)# ipv6 unicast routing; router(config)# ipv6 router eigrp <number>; router(config)# no shutdown; router(config)# router-id x.x.x.x; router(config-router)# exit

MAC-Address Table

Switch MAC Learning (Based on Source MAC Address; Addresses age out after inactivity-timer); Switching forwarding (Based on Destination MAC; Broadcast/Multicast/Unknown flooding; All ports initially in one, large, broadcast domain)

Access Port

Switchport configured for only a single broadcast domain (VLAN) Configuring - Switch(config)# interface <interface>; Switch(config-if)# switchportmode access; Switch(config-if)# switchportaccess vlan<vlan-id>

Data Communications Equipment (DCE)

The mechanisms and links of a communications network that make up the network portion of the user-to-network interface, such as modems; supplies the physical connection to the network, forwards traffic, and provides a clocking signal to synchronize data transmission between devices

Core Layer

Top layer in the Cisco three-layer hierarchical model, which helps you design, build, and maintain Cisco hierarchical networks; passes packets quickly to distribution-layer devices only. No packet filtering should take place at this layer

True

True or False, routers filter the network based on the network layer using information like IP addresses.

True

True or False, switches create separate collision domains within a single broadcast domain. Routers provide a separate broadcast domain for each interface.

True

True or False, you create an internetwork when you connect two or more networks via a router and configure a logical network addressing scheme with a protocol such as IP or IPv6.

False

True or false, routers forward broadcasts by default.

cdp run

Turns on CDP on a router

Inter-VLAN Routing

Two ways to configure (Router-on-a-stick model, Routing with SVI); A router is usually configured using sub-interface; Single point of failure; Configuring a trunk interface that is connected to the router (Switch(config-if)# switchportmode trunk); Configuring sub-interface for respective VLANs (Router(config-sub-if)# encapsulation dot1q <vlan-id>, Router(config-sub-if)# ipaddress <address> <subnet mask>); Multilayer Switches can route between VLANs; Requires a separate SVI for each VLAN (Each SVI needs a physical port (Access or Trunk) in that VLAN); Hosts point to IP address on SVI as their default gateway

Static Routing

Typically used in the small network; Info on destination prefix and gateway are required; Can increase administrative overhead; No dynamic fail-over; Preferred over dynamic routing protocols because of lower administrative distance; Configuration (next-hop): Router(config)#ip route <destination-network> <destination subnet mask> <next-hop>; Configuration (outgoing interface): Router(config)#iproute <destination-network> <destination subnet mask> <outgoing interface>; Verification: Router# show ip route; Router# show ip route static; Router# show running-config| include ip route; Router# show ip protocol; Router# show ip route <prefix> <mask>

Domain Name Service (DNS)

Used by computers to resolve host names to IP addresses; Typically uses UDP port 53; DNS server responds to DNS requests (Host sends DNS A-Record query; DNS server responds with A-Record query response)

Route Poisoning

Used by various DV routing protocols in order to overcome large routing loops and offer explicit information about when a subnet or network is not accessible (instead of merely suggesting that the network is unreachable by not including it in updates). Typically, this is accomplished by setting the hop count to one more than maximum

Routing Metric

Used for best path selection process; IGPs use metric for shortest path calculation; Lower value is preferred; Depends on the routing protocol architecture (EIGRP metric = composite formula utilizing link bandwidth + delay; RIP metric = hop count; OSPF metric = link bandwidth)

Discard Eligibility (DE)

Used in Frame Relay networks to tell a switch that a frame can be discarded if the switch is too busy. The DE is a field in the frame that is turned on by transmitting routers if the Committed Information Rate (CIR) is oversubscribed or set to 0

Application Specific Integrated Circuits (ASICs)

Used in layer-2 switches to make filtering decisions; looks in the filter table of MAC addresses and determines which port the destination hardware address of a received hardware address is destined for. The frame will be allowed to traverse only that one segment. If the hardware address is unknown, the frame is forwarded out all ports

Data Link Connection Identifier (DLCI)

Used to identify virtual circuits in a Frame Relay network; works as a layer 2 address in frame relay; works like a MAC address in a LAN; 10-bit value that ranges from 0 to 1023, where 0-15 and 1007-1023 are reserved

Loop Guard

Used to prevent loops caused by unidirectional link; Uses BPDU keepalive to detect unidirectional link; BPDUs should always be received on a Blocked port; If BPDUs don't arrive, normally convert to a Designated port; Configured with spanning-tree guard loop interface-specific command

VLAN Trunking Protocol (VTP)

Used to update switches in a switch fabric about VLANs configured on a [TERM] server; can be a [TERM] server, client, or transparent device. Servers update clients. Transparent devices are only local devices and do not share information with [TERM] clients; send VLAN information down trunked links only

Basic Management Setup

Used with Cisco routers when in setup mode. Only provides enough management and configuration to get the router working so someone can telnet into the router and configure it

R Reference Point

Used with ISDN networks to identify the connection between an NT1 and an S/T device. The S/T device converts the 4-wire network to the two-wire ISDN standard network

Wildcard

Used with access-list, supernetting, and OSPF configurations; designations used to identify a range of subnets

T Reference Point

Used with an S reference point to change a 4-wire ISDN network to a 2-wire ISDN network

Circuit Switching

Used with dial-up networks such as PPP and ISDN. Passes data, but needs to set up the connection first—just like making a phone call

Circuit Switching

Used with dial-up networks such as PPP and ISDN. Passes data, but needs to set up the connection first—just like making a phone call; POTS (plain old telephone service); ISDN (integrated Services Digital Network); typically use modem which transfers digital/analog data; method of establishing a WAN that didn't exist before and it goes down after; takes time to establish circuit

Port Security

Used with layer-2 switches to provide some security. Not typically used in production because it is difficult to manage. Allows only certain frames to traverse administrator-assigned segments; Used to limit access to a port based on MAC address or quantity of connected devices; Can be configured on static access and trunk ports (but not "dynamic" ports); A secure port cannot be: Destination port for SPAN, Port-channel, Private VLAN port Enabling port security: Switch(config-if)# switchportport-security Limiting number of MAC addresses: Switch(config-if)# switchportport-security maximum <number>, Switch(config-if)# switchportport-security mac-address <MAC> <sticky> Configuring recovery interval: Switch(config)# errdisablerecovery psecure-violation, Switch(config)# errdisablerecovery interval <interval in sec> Verifying Port Security: Switch# Show port-security, Switch# Show port-security interface <intf-type> <intf-number>

Designated Port

Used with the Spanning-Tree Protocol (STP) to designate forwarding ports (ports that can send frames). If there are multiple links to the same network, STP will shut a port down to stop network loops

Root Bridge

Used with the Spanning-Tree Protocol to stop network loops from occurring; elected by having the lowest bridge ID. The bridge ID is determined by the priority (32,768 by default on all bridges and switches) and the main hardware address of the device; determines which of the neighboring layer-2 devices' interfaces become the designated and nondesignated ports

Network Address

Used with the logical network addresses to identify the network segment in an internetwork. Logical addresses are hierarchical in nature and have at least two parts: network and host. An example of a hierarchical address is 172.16.10.5, where 172.16 is the network and 10.5 is the host address

Address Learning

Used with transparent bridges to learn the hardware addresses of all devices on an internetwork. The switch then filters the network with the known hardware (MAC) addresses

Split Horizon

Useful for preventing routing loops, a type of distance-vector routing rule where information about routes is prevented from leaving the router interface through which that information was received

High-Level Data Link Control (HDLC)

Using frame characters, including checksums, it designates a method for data encapsulation on synchronous serial links and is the default encapsulation for Cisco routers; a bit-oriented synchronous Data-Link layer protocol created by ISO and derived from SDLC; most of its vendor implementations (including Cisco's) are proprietary

Dynamic Routing

Usually configured in large/ISP networks; Can be categorized into two sections (IGP, Interior Gateway Protocol, Protocol that works within the Autonomous System Number; EGP, Exterior Gateway Protocol, Protocol that interconnects multiple Autonomous System Numbers); Dynamic failover

Toll Network

WAN network that uses the Public Switched Telephone Network (PSTN) to send packets

Computers, networking, and media.

What 3 component categories do you need to build a network?

Cost, security, speed, topology, scalability, reliability, and availability.

What 7 characteristics should be considered when creating or maintaining a network?

C • traffic filtering

What access-point feature allows a network administrator to define what type of data can enter the wireless network? A • encryption B • hacking block C • traffic filtering D • MAC address filtering E • authentication

It uses coaxial copper and fiber connections, and it supports higher rates than DSL.

What are 2 characteristics of Cable access?

They are not available at all locations, and they are difficult to set up and troubleshoot,

What are 2 downsides to using cell-switched services?

E-mail, FTP, and web applications.

What are 3 common networking applications?

DSL provides speeds up to a few megabits per second (Mbps), it costs much less than a typical WAN circuit from the carrier, it supports both voice and video, and doesn't require a dial-up connection.

What are 4 characteristics of DSL?

Cable and DSL modems, carrier switches, CSU/DSU's, firewalls, modems, NT1's, and routers.

What are 7 networking devices that are used in WAN connections?

To connect networking devices that are in a very close geographic area.

What are Local area networks (LANs) used for?

To connect LAN's together, even when they are separated by a large distance.

What are Wide Area Networks (WAN's) used for?

Specialized network components that typically provide many security functions.

What are network security appliances?

protocols developed by organizations who have control over their definition and operation

What are proprietary protocols?

Coverage is limited to about 18,000 feet, and it is not available in all areas.

What are the 2 main disadvantages of DSL?

Circuit-switched, cell-switched, packet-switched, and dedicated connections.

What are the 4 basic type of WAN connections or circuits?

D • 64 bit E • 128 bit

What are the two WEP key lengths? (Choose two.) A • 8 bit B • 16 bit C • 32 bit D • 64 bit E • 128 bit

C • anytime, anywhere connectivity D • easy and inexpensive to install F • ease of adding additional devices

What are three advantages of wireless over wired technology? (Choose three.) A • more secure B • longer range C • anytime, anywhere connectivity D • easy and inexpensive to install E • ease of using licensed air space F • ease of adding additional devices

C • mobility D • reduced installation time

What are two benefits of wireless networking over wired networking? (Choose two.) A • speed B • security C • mobility D • reduced installation time E • allows users to share more resources F • not susceptible to interference from other devices

directing data packets to destination hosts on other networks providing end devices with a unique network identifier Refer to curriculum topic: 6.1.1 The network layer is primarily concerned with passing data from a source to a destination on another network. IP addresses supply unique identifiers for the source and destination. The network layer provides connectionless, best-effort delivery. Devices rely on higher layers to supply services to processes.

What are two functions that are provided by the network layer? (Choose two.)

A. Hosts can connect to the network and get an IP address without manual configuration.

What benefit does DHCP provide to a network? A. Hosts can connect to the network and get an IP address without manual configuration. B. Duplicate addresses cannot occur on a network that issues dynamic addresses using DHCP and has static assignments. C. Hosts always have the same IP address and are therefore always reachable. D. DHCP allows users to refer to locations by a name rather than an IP address.

B • a change of the default IP address

What best practice relates to wireless access point security? A • activation of a popup stopper B • a change of the default IP address C • an update in the antivirus software definitions D • physically securing the cable between the access point and client

A. ipconfig

What command can be used on a Windows PC to see the IP configuration of that computer? A. ipconfig B. show interfaces C. show ip interface brief D. ping

nslookup

What command is used to determine if a DNS server is providing name resolution?

tracert

What command is used to determine the location of delay for a packet traversing the Internet?

(config)# service password-encryption

What command will prevent all unencrypted passwords from displaying in plain text in a configuration file?

A. Each IP address must be unique within the local network.

What criterion must be followed in the design of an IPv4 addressing scheme for end devices? A. Each IP address must be unique within the local network. B. Each IP address must match the address that is assigned to the host by DNS. C. Each IP address needs to be compatible with the MAC address. D. Each local host should be assigned an IP address with a unique network component.

SOHO

What describew users working from home?

B • the router interface closest to the computer

What device is typically used as the default gateway for a computer? A • a server hosted by the ISP B • the router interface closest to the computer C • a server managed by a central IT department D • the switch interface that connects to the computer

Protocols are used to implement applications.

What do Protocols do?

How network components communicate across the physical topology.

What does a logical topology describe?

How network components are connected.

What does a network topology define?

How network components are physically cabled together.

What does a physical topology describe?

Sets an IP address on an interface

What does the "ip address" command do?

C • speed of transmission

What does the 100 mean when referencing the 100BASE-T Ethernet standard? A • type of cable used B • type of data transmission C • speed of transmission D • type of connector required E • maximum length of cable allowed

C • The device is interoperable with other devices of the same standard that also display the Wi-Fi logo.

What does the Wi-Fi logo indicate about a wireless device? A • IEEE has approved the device. B • The device is interoperable with all other wireless standards. C • The device is interoperable with other devices of the same standard that also display the Wi-Fi logo. D • The device is backwards compatible with all previous wireless standards.

A • a large corporate environment

What environment would be best suited for a two-firewall network design? A • a large corporate environment B • a home environment with 10 or fewer hosts C • a home environment that needs VPN access D • a smaller, less congested business environment

The host portion of the IP addresses will be different.

What happens when two devices on the same subnet are communicating?

source and destination IP addresses

What information is contained in an IP header?

B • keeps broadcasts contained within a local network

What is a benefit of having a router within the distribution layer? A • prevents collisions on a local network B • keeps broadcasts contained within a local network C • controls which hosts have access to the network D • controls host-to-host traffic within a single local network

fostering competition among device and software vendors by enforcing the compatibility of their products

What is a benefit of using a layered model for network communications?

to describe the ordered and reliable delivery of data between source and destination

What is a function of Layer 4 of the OSI model?

D • exploits vulnerabilities with the intent of propagating itself across a network

What is a major characteristic of a Worm? A • malicious software that copies itself into other executable programs B • tricks users into running the infected software C • a set of computer instructions that lies dormant until triggered by a specific event D • exploits vulnerabilities with the intent of propagating itself across a network

A network is all of the components involved in connecting computers and applications across small and large distances to increase productivity and give easy access to information.

What is a network?

D • It enables the user to set more specific security access levels.

What is a reason for disabling simple file sharing? A • It enables the user to map a remote resource with a local drive. B • It enables the user to share all files with all users and groups. C • It enables the user to share printers. D • It enables the user to set more specific security access levels.

A. All passwords in the configuration are not shown in clear text when viewing the configuration.

What is a result of using the service password-encryption command on a Cisco network device? A. All passwords in the configuration are not shown in clear text when viewing the configuration. B. The command encrypts the enable mode password. C. The command encrypts the banner message. D. A network administrator who later logs into the device will be required to enter an administrator password in order to gain access to the Cisco device.

It informs network devices to maintain the same path for real-time application packets.

What is a service provided by the Flow Label field of the IPv6 header?

A. if there is connectivity with the destination device

What is a user trying to determine when issuing a ping 10.1.1.1 command on a PC? A. if there is connectivity with the destination device B. the path that traffic will take to reach the destination C. what type of device is at the destination D. if the TCP/IP stack is functioning on the PC without putting traffic on the wire

B • spam

What is a widely distributed approach to marketing on the Internet that advertises to as many individual users as possible via IM or e-mail? A • brute force B • spam C • spyware D • tracking cookies

A client host and a server running different operating systems can successfully exchange data.

What is an advantage of network devices using open standard protocols?

It prevents changes in one layer from affecting other layers.

What is an advantage of the use of layers in the OSI reference model?

Products from different manufacturers can interoperate successfully.

What is an advantage of using standards to develop and implement protocols?

Two routers connected across a dedicated WAN circuit.

What is an example of a point-to-point topology?

the privileged executive mode password

What is encrypted with the enable secret command?

B • It identifies missing security updates on a computer.

What is one function that is provided by a vulnerability analysis tool? A • It provides various views of possible attack paths. B • It identifies missing security updates on a computer. C • It identifies wireless weak points such as rogue access points. D • It identifies all network devices on the network that do not have a firewall installed. E • It identifies MAC and IP addresses that have not been authenticated on the network.

C • Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word.

What is the difference between using open authentication and pre-shared keys? A • Open authentication requires a password. Pre-shared keys do not require a password. B • Open authentication is used with wireless networks. Pre-shared keys are used with wired networks. C • Pre-shared keys require an encrypted secret word. Open authentication does not require a secret word. D • Pre-shared keys require a MAC address programmed into the access point. Open authentication does not require this programming.

N x (N-1) divided by 2, where N is the number of locations.

What is the formula that is used to determine the number of links needed to fully mesh a WAN?

A • detects transmission errors

What is the function of the FCS field in an Ethernet frame? A • detects transmission errors B • provides timing for transmission C • contains the start of frame delimiter D • indicates which protocol will receive the frame

protocol data unit

What is the general term that is used to describe a piece of data at any layer of a networking model?

EIA

What is the international standards and trade organization for electronics organizations that is best known for its standards related to electrical wiring, connectors, and the 19-inch racks used to mount networking equipment.

If the center of the star fails, no devices can communicate. Overcome by using an extended star topology that is multiple interconnected star topologies.

What is the main disadvantage of a star topology, and how can it be overcome?

IEEE

What is the professional organization for those in the electrical engineering and electronics fields that creates and maintains standards affecting a wide range of industries including telecommunications, and networking?

E • identifies the device that allows local network computers to communicate with devices on other networks

What is the purpose of a default gateway? A • physically connects a computer to a network B • provides a permanent address to a computer C • identifies the network to which a computer is connected D • identifies the logical address of a networked computer and uniquely identifies it to the rest of the network E • identifies the device that allows local network computers to communicate with devices on other networks

D • They are used to determine the network that the host is located on.

What is the purpose of logical addresses in an IP network? A • They identify a specific NIC on a host device. B • They are used to determine which host device accepts the frame. C • They provide vendor-specific information about the host. D • They are used to determine the network that the host is located on. E • They are used by switches to make forwarding decisions.

providing the rules required for a specific type of communication to occur

What is the purpose of protocols in data communications?

flow control

What method can be used by two computers to ensure that packets are not dropped because too much data is being sent too quickly?

ISO

What organization developed the OSI reference model that is used in networking?

acceptable use

What part of the security policy states what applications and usages are permitted or denied?

C • acceptable use

What part of the security policy states what applications and usages are permitted or denied? A • identification and authentication B • remote access C • acceptable use D • incident handling

Data and applications, printers, network storage components, and backup storage components.

What resources are commonly shared across a network?

Ask the user what URL has been typed and what error message displays.

What should a network administrator do first after receiving a call from a user who cannot access the company web server?

Minimal delay and latency.

What specific requirements are needed for large data transfers for things such as Voice over IP (VOIP) and video Quality of Service (QoS)?

ARP is used to discover the MAC address of any host on the local network.

What statement describes the function of the Address Resolution Protocol?

D • Internet access can be denied for specific days and times.

What statement is true about security configuration on a Linksys integrated router? A • A DMZ is not supported. B • The router is an example of a server-based firewall. C • The router is an example of an application-based firewall. D • Internet access can be denied for specific days and times.

D • encryption

What term describes the encoding of wireless data to prevent intercepted data from being read by a hacker? A • address filtering B • authentication C • broadcasting D • encryption E • passphrase encoding

appliance-based

What term is used to describe a dedicated hardware device that provides firewall services?

D • appliance-based

What term is used to describe a dedicated hardware device that provides firewall services? A • server-based B • integrated C • personal D • appliance-based

protocol stack

What term is used to describe how TCP/IP protocols are layered and interact to format, address, and transmit information across a network?

data encoding message size delivery options

What three functions are defined by network protocols to allow communication between known source and destination IP addresses? (Choose three.)

destination MAC address error-checking information

What three items are contained in an Ethernet header and trailer? (Choose three.)

B • popups

What type of advertising is typically annoying and associated with a specific website that is being visited? A • adware B • popups C • spyware D • tracking cookies

A • Open

What type of authentication does an access point use by default? A • Open B • PSK C • WEP D • EAP

e-mail

What type of server would use IMAP?

IOS

What will a network administrator use to modify a configuration on a Cisco router?

When redundancy is needed, and the benefit is that in a dual-ring topology, the ring can loop back on itself.

When are dual ring topologies used, and what is the benefit?

upper-layer connection-oriented protocols

When connectionless protocols are implemented at the lower layers of the OSI model, what are usually used to acknowledge the data receipt and request the retransmission of missing data?

Flow Label Refer to curriculum topic: 6.1.4 The Flow Label in IPv6 header is a 20-bit field that provides a special service for real-time applications. This field can be used to inform routers and switches to maintain the same path for the packet flow so that packets will not be reordered.

When transporting data from real-time applications, such as streaming audio and video, which field in the IPv6 header can be used to inform the routers and switches to maintain the same path for the packets in the same conversation?

when the full IOS cannot be found

When would the Cisco IOS image held in ROM be used to boot the router?

DNS server

Whenever e-mail clients send letters, what device is used to translate the domain names into their associated IP addresses?

Carrier networks, such as telephone companies and Internet service providers.

Where are WAN's leased from?

802.11

Which IEEE standard enables a wireless NIC to connect to a wireless AP that is made by a different manufacturer?

differentiated services

Which IPv4 header field is responsible for defining the priority of the packet?​

Frame

Which PDU format is used when bits are received from the network medium by the NIC of a host?

E • wireless client

Which WLAN component is commonly referred to as an STA? A • cell B • antenna C • access point D • wireless bridge E • wireless client

DMZ

Which acronym refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices?

B • DMZ

Which acronym refers to an area of the network that is accessible by both internal, or trusted, as well as external, or untrusted, host devices? A • SPI B • DMZ C • ISR D • ISP

destination MAC address

Which address does a NIC use when deciding whether to accept a frame?

D • destination MAC address

Which address does an NIC use when deciding whether to accept a frame? A • source IP address B • source MAC address C • destination IP address D • destination MAC address E • source Ethernet address

logical address

Which address provides a unique host address for data communications at the internet layer?

DNS

Which application is most likely used to translate www.cisco.com to 198.133.219.25?

show ip interface brief

Which command displays a summary chart of all router interfaces, their IP addresses, and their current operational status?

D • hub

Which device accepts a message on one port and always forwards the message to all other ports? A • modem B • switch C • router D • hub

local router

Which device acts as a gateway to allow hosts to send traffic to remote IP networks?

gateway of last resort Refer to curriculum topic: 6.2.2 A default static route is used as a gateway of last resort to forward unknown destination traffic to a next hop/exit interface. The next-hop or exit interface is the destination to send traffic to on a network after the traffic is matched in a router. The route source is the location a route was learned from.

Which feature on a Cisco router permits the forwarding of traffic for which there is no specific route?

B. the switch virtual interface

Which interface allows remote management of a Layer 2 switch? A. the AUX interface B. the switch virtual interface C. the console port interface D. the first Ethernet port interface

destination IP address

Which logical address is used for delivery of data to a remote network?

broadcast

Which message delivery option is used when all devices need to receive the same message simultaneously?

A • CLI

Which method of interacting with an operating system involves typing commands at a command prompt? A • CLI B • GUI C • redirector D • kernel translator

IEEE

Which organization develops the 802 family of standards for wired and wireless LANs and MANs?

25

Which port number is used by SMTP?

B. Use the console port to locally access the switch from a serial or USB interface of the PC.

Which procedure is used to access a Cisco 2960 switch when performing an initial configuration in a secure environment? A. Use Telnet to remotely access the switch through the network. B. Use the console port to locally access the switch from a serial or USB interface of the PC. C. Use Secure Shell to remotely access the switch through the network​. D. Use the AUX port to locally access the switch from a serial or USB interface of the PC.

TCP

Which protocol is responsible for controlling the size and rate of the HTTP messages exchanged between server and client?

TCP

Which protocol is used by FTP to transfer files over the Internet?

SMTP

Which protocol is used by e-mail servers to communicate with each other?

HTTP

Which protocol is used to access this website?

1 - perform the POST and load the bootstrap program 2 - locate and load the Cisco IOS software 3 - locate and load the startup configuration file or enter setup mode Refer to curriculum topic: 6.3.2 When a router is powered on, it undergoes a POST to verify that the hardware is functional, after which it proceeds by locating and loading the Cisco IOS software and then loading the startup configuration file if one is present.

Which router bootup sequence is correct?​

A configured and activated router interface must be connected to another device in order to operate.

Which statement about router interfaces is true?

Segments are sent from the transport layer to the internet layer.

Which statement accurately describes a TCP/IP encapsulation process when a PC is sending data to the network?

It does not allow spaces.

Which statement describes a feature of an IOS host name configuration?

They define how messages are exchanged between the source and the destination.

Which statement is correct about network protocols?

A • requires no authentication

Which statement is true about open authentication when it is enabled on an access point? A • requires no authentication B • uses a 64-bit encryption algorithm C • requires the use of an authentication server D • requires a mutually agreed upon password

A • Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied.

Which statement is true about port forwarding within a Linksys integrated router? A • Only external traffic that is destined for specific internal ports is permitted. All other traffic is denied. B • Only external traffic that is destined for specific internal ports is denied. All other traffic is permitted. C • Only internal traffic that is destined for specific external ports is permitted. All other traffic is denied. D • Only internal traffic that is destined for specific external ports is denied. All other traffic is permitted.

The TCP/IP transport layer and OSI Layer 4 provide similar services and functions.

Which statement is true about the TCP/IP and OSI models?

B. It affects the operation of the device immediately when modified.

Which statement is true about the running configuration file in a Cisco IOS device? A. It is automatically saved when the router reboots. B. It affects the operation of the device immediately when modified. C. It should be deleted using the erase running-config command. D. It is stored in NVRAM.

A • created by connecting wireless clients in a peer-to-peer network

Which statement is true concerning an ad-hoc wireless network? A • created by connecting wireless clients in a peer-to-peer network B • created by connecting wireless clients to a single, centralized AP C • created by connecting multiple wireless basic service sets through a distribution system D • created by connecting wireless clients to a wired network using an ISR

connects two networks with a wireless link

Which statement is true concerning wireless bridges?

A • connects two networks with a wireless link

Which statement is true concerning wireless bridges? A • connects two networks with a wireless link B • stationary device that connects to a wireless LAN C • allows wireless clients to connect to a wired network D • increases the strength of a wireless signal

C • Only after a virus is known can an anti-virus update be created for it.

Which statement is true regarding anti-virus software? A • Only e-mail programs need to be protected. B • Only hard drives can be protected. C • Only after a virus is known can an anti-virus update be created for it. D • Only computers with a direct Internet connection need it.

B • routing table

Which table does a router use to make decisions on where a data packet is to be sent? A • ARP table B • routing table C • network table D • forwarding table

B • encapsulation

Which term is used to describe the process of placing one message format into another format so that the message can be delivered across the appropriate medium? A• flow control B • encapsulation C • encoding D • multicasting E • access method

login line console 0 password cisco

Which three commands are used to set up a password for a person who attaches a cable to a new router so that an initial configuration can be performed? (Choose three.)

C • IP address D • subnet mask E • default gateway

Which three pieces of information must be specified on a computer to allow that computer to send and receive information across networks? (Choose three.) A • closest server B • operating system C • IP address D • subnet mask E • default gateway F • network card driver

route print netstat -r

Which two commands can be used on a Windows host to display the routing table? (Choose two.)

A. The contents of flash may be overwritten. C. Flash provides nonvolatile storage.

Which two features are characteristics of flash memory? (Choose two.) A. The contents of flash may be overwritten. B. Flash receives a copy of the IOS from RAM when a device is powered on. C. Flash provides nonvolatile storage. D. The contents of flash may be lost during a power cycle. E. Flash is a component in Cisco switches but not in Cisco routers.

Socket

1) A software structure that operates within a network device as a destination point for communications. 2) In AppleTalk networks, an entity at a specific location within a node; AppleTalk sockets are conceptually similar to TCP/IP ports

C • EAP E • pre-shared keys

16. What are two authentication methods that an access point could use? (Choose two.) A • WEP B • WPA C • EAP D • ASCII E • pre-shared keys

startup configuration IOS image Refer to curriculum topic: 6.3.2 A router loads the IOS image file and startup configuration file into RAM when it boots. Then the startup configuration file is copied into RAM as the running configuration file. The power-on self-test (POST) is a process that occurs on almost every computer during bootup. A bootstrap program is a program that is executed just after the POST.

Which two files are loaded into RAM by the router when it boots? (Choose two.)

IOS image file Startup configuration

Which two files, if found, are copied into RAM as a router with the default configuration register setting boots up? (Choose two.)

WAN interfaces LAN interfaces

Which two interfaces will allow access via the VTY lines to configure the router? (Choose two.)

Bridge Protocol Data Units (BPDUs)

A Spanning-Tree Protocol initializing packet that is sent at definable intervals for the purpose of exchanging information among bridges in networks; still received on a blocked port, but no forwarding of frames and [TERM] is allowed; are used to send configuration messages using multicast frames

DNS

A network client in a corporate environment reboots. Which type of server would most likely be used first?

Exterior Gateway Protocol (EGP)

Connects multiple Autonomous System Numbers; Can carry more routing tables than IGPs (Example: BGP)

Device one connects to device two, device two connects to device three, and so on to the last device, which connects back to the first device. Ring topologies can be implemented with a single ring or a dual ring.

Describe a ring topology.

Physical: star Logical: ring

Describe the physical and logical topologies of Token Ring media.

?

Gives you a help screen

Subnet Mask

Helps identify network and host portion of network; Default subnet masks: Class A: 255.0.0.0 or /8, Class B: 255.255.0.0 or /16, Class C: 255.255.255.0 or /24; Typically called classful address

A • naming scheme B • IP addressing scheme

Which two items are included in a network logical map? (Choose two.) A • naming scheme B • IP addressing scheme C • length of cable runs D • physical location of networking devices E • specific layout of interconnections between networking devices and hosts

C • computer name D • IP address

Which two items must be unique to each computer and cannot be duplicated on a network? (Choose two.) A • partition B • file system C • computer name D • IP address E • operating system

response time out flow control

Which two message timing mechanisms are used in data communications? (Choose two.)

B • hub C • switch

Which two networking devices are used to connect hosts to the access layer? (Choose two.) A • router B • hub C • switch D • server E • computer

A • tells a wireless device to which WLAN it belongs D • all wireless devices on the same WLAN must have the same SSID

Which two statements about a service set identifier (SSID) are true? (Choose two.) A • tells a wireless device to which WLAN it belongs B • consists of a 32-character string and is not case sensitive C • responsible for determining the signal strength D • all wireless devices on the same WLAN must have the same SSID E • used to encrypt data sent across the wireless network

B • When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake. D • Even with anti-spam software installed, users should be careful when opening e-mail attachments.

Which two statements are true concerning anti-spam software? (Choose two.) A • Anti-spam software can be loaded on either the end-user PC or the ISP server, but not both. B • When anti-spam software is loaded, legitimate e-mail may be classified as spam by mistake. C • Installing anti-spam software should be a low priority on the network. D • Even with anti-spam software installed, users should be careful when opening e-mail attachments. E • Virus warning e-mails that are not identified as spam via anti-spam software should be forwarded to other users immediately.

C • With SSID broadcast disabled, an attacker must know the SSID to connect. D • Using the default IP address on an access point makes hacking easier.

Which two statements characterize wireless network security? (Choose two.) A • Wireless networks offer the same security features as wired networks. B • Wardriving enhances security of wireless networks. C • With SSID broadcast disabled, an attacker must know the SSID to connect. D • Using the default IP address on an access point makes hacking easier. E • An attacker needs physical access to at least one network device to launch an attack.

Specifies a single host address

Host

Trace

IP command used to trace the path a packet takes through an internetwork

Presentation

Layer responsible for data encryption, compression, and translation services.

C • provides consistent interconnections across networks E • simplifies new product development

Which two statements concerning networking standards are true? (Choose two.) A • adds complexity to networks B • encourages vendors to create proprietary protocols C • provides consistent interconnections across networks D • ensures that communications work best in a single-vendor environment E • simplifies new product development

C • MAC addresses only

Which type of address is used in an Ethernet frame header? A • logical addresses only B • IP addresses only C • MAC addresses only D • broadcast addresses only

Maintenance

Which type of installation threat involves keeping spares on hand to mitigate the threat?

Integrated Services Digital Network (ISDN)

Offered as a service by telephone companies, a communication protocol that allows telephone networks to carry data, voice, and other digital traffic

Leased Lines

Permanent connections between two points leased from the telephone companies

Time-to-Live Refer to curriculum topic: 6.1.3 When a router receives a packet, the router will decrement the Time-to-Live (TTL) field by one. When the field reaches zero, the receiving router will discard the packet and will send an ICMP Time Exceeded message to the sender.

Which value, that is contained in an IPv4 header field, is decremented by each router that receives a packet?

cdp enable

Turns on CDP on an individual interface

Bridges and Switches

Used to segment networks, but they will not isolate broadcast or multicast packets.

Composite Metric

Used with routing protocols, such as IGRP and EIGRP, that use more than one metric to find the best path to a remote network. IGRP and EIGRP both use bandwidth and delay of the line by default. However, Maximum Transmission Unit (MTU), load, and reliability of a link can be used as well

Static VLAN

VLANs that are manually configured port-by-port. This is the method typically used in production networks

instant messaging

What client software enables logged in users to communicate with other logged in users in real time?

physical, data link, network, transport, session, presentation, application

What is the correct order of the layers of the OSI reference model, starting at the lowest layer and working up the model?

WAN's typically use a partial mesh topology in order to reduce the cost of connecting components and locations.

What type of mesh topology does a WAN use, and why?

IEEE

Which standards organization developed the 802.3 (Ethernet) standard?

Applies an IP access list to an interface

ip access-group

C • Trojan horse

While surfing the Internet, a user notices a box claiming a prize has been won. The user opens the box unaware that a program is being installed. An intruder now accesses the computer and retrieves personal information. What type of attack occurred? A • worm B • virus C • Trojan horse D • denial of service

Ping

A Unix-based Internet diagnostic tool, consisting of a message sent to test the accessibility of a particular device on the IP network. The acronym (from which the "full name" was formed) reflects the underlying metaphor of submarine sonar. Just as the sonar operator sends out a signal and waits to hear it echo back from a submerged object, the network user can [TERM] another node on the network and wait to see if it responds

Logical

A __________ topology describes how devices communicate with each other.

Bus

A __________ topology uses a single cable to connect all devices together.

loop-back

A address is defined as a reserved address that routes packets back to the host.

Ethernet

A baseband LAN specification created by the Xerox Corporation and then improved through joint efforts of Xerox, Digital Equipment Corporation, and Intel; similar to the IEEE 802.3 series standard and, using CSMA/CD, operates over various types of cables at 10Mbps

Link Accessed Procedure, Balanced (LAPB)

A bit-oriented Data-Link layer protocol that is part of the X.25 stack and has its origin in SDLC

Access

A brute-force password attack would be classified as what kind of attack?

1) remove Ethernet header and trailer 2) remove IP header 3) remove TCP header 4) pass data to the application

A client has decoded a frame and started the de-encapsulation process. In which order does the de-encapsulation process occur?

The packet will be sent directly to the destination host.

A computer has to send a packet to a destination host in the same LAN. How will the packet be sent?

Multicast

A computer in a given network is communicating with a specific group of computers. What type of communication is this?

OSI (Open Systems Interconnection) model

A conceptual model defined by the International Organization for Standardization (ISO), describing how any combination of devices can be connected For the purpose of communication. This model divides the task into seven functional layers, forming a hierarchy with the applications at the top and the physical medium at the bottom, and it defines the functions each layer must provide.

Transmission Control Protocol (TCP)

A connection-oriented protocol that is defined at the Transport layer of the OSI reference model. Provides reliable delivery of data connection oriented; Reliable; Protocol number 6

substitution

A customer called the cable company to report that the Internet connection is unstable. After trying several configuration changes, the technician decided to send the customer a new cable modem to try. What troubleshooting technique does this represent?

Bridges

A device for connecting two segments of a network and transmitting packets between them. Both segments must use identical protocols to communicate; function at the Data Link layer, Layer 2 of the OSI reference model. Its purpose is to filter, send, or flood any incoming frame, based on the MAC address of that particular frame; considered software based, switches are hardware based

removes the Ethernet header and trailer

A device receives an Ethernet frame and recognizes the MAC address as its own. What does the device do to the message to get to the encapsulated data?

Terminal Equipment 1

A device with a four-wire, twisted-pair digital interface; Most modern ISDN devices are of this type

Channel Service Unit/Data Service Unit (CSU/DSU)

A digital mechanism that connects end-user equipment to the local digital telephone loop

SYN flooding

A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred?

D • SYN flooding

A flood of packets with invalid source-IP addresses requests a connection on the network. The server busily tries to respond, resulting in valid requests being ignored. What type of attack occurred? A • Trojan horse B • brute force C • ping of death D • SYN flooding

Cut-Through Frame Switching

A frame-switching technique that flows data through a switch so that the leading edge exits the switch at the output port before the packet finishes entering the input port. Frames will be read, processed, and forwarded by devices that use this type of switching as soon as the destination address of the frame is confirmed and the outgoing port is identified

Virtual LAN (VLAN)

A group of devices on one or more logically segmented LANs (configured by use of management software), enabling devices to communicate as if attached to the same physical medium, when they are actually located on numerous different LAN segments; based on logical instead of physical connections and thus are tremendously flexible

Broadcast Domain

A group of devices receiving broadcast frames initiating from any device within the group; generally surrounded by routers because they do not forward broadcast frames

Autonomous System (AS) number

A group of networks under mutual administration that share the same routing methodology; subdivided by areas and must be assigned an individual 16-bit number by the IANA; 16-bit numbering system; Group of devices under a single technical administration; Usually an IGP is considered an AS; Ranges from 1 through 65535

Terminal Adapter (TA)

A hardware interface between a computer without a native ISDN interface and an ISDN line. In effect, a device to connect a standard async interface to a non-native ISDN device, emulating a modem

Access Link

A link used with switches and is only part of one Virtual LAN (VLAN). Trunk links carry information from multiple VLANs

Open Shortest Path First (OSPF)

A link-state, hierarchical IGP routing algorithm derived from an earlier version of the IS-IS protocol, whose features include multipath routing, load balancing, and least-cost routing; suggested successor to RIP in the Internet environment; Open standard; SPF (shortest path first) algorithm; Hello used for neighbor relationship (Hello timer = 10 secs, Hold timer = 40 seconds); Works based on area hierarchy, minimizes LSA flooding; Supports clear-text and MD5 authentication; its states include: init, two way, exstart, exchange, loading, full state; supports VLSM and CIDR; manual summarization on the boundary/border routes such as ABR and ASBR; routing update is sent using multicast address 224.0.0.5 (or 224.0.0.6 when DR/BDR present); supports special area types such as stub, totally stub and NSSA

Network Control Protocol (NCP)

A method of establishing and configuring different Network layer protocols. PPP is designed to allow the simultaneous use of multiple Network layer protocols

Classless Interdomain Routing (CIDR)

A method supported by classless routing protocols, such as OSPF and BGP4, based on the concept of ignoring the IP class of address, permitting route aggregation and VLSM that enable routers to combine routes in order to minimize the routing information that needs to be conveyed by the primary routers. It allows a group of IP networks to appear to other networks as a unified, larger entity. In CIDR, IP addresses and their subnet masks are written as four dotted octets, followed by a forward slash and the numbering of masking bits; Beyond the classful behavior; Class A address can be treated as Class B & C or vice versa; Ex: 10.0.0.0/24 [/24 is prefix-length from Class C]

Flow Control

A methodology used to ensure that receiving units are not overwhelmed with data from sending devices. Pacing, as it is called in IBM networks, means that when buffers at a receiving unit are full, a message is transmitted to the sending unit to temporarily halt transmissions until all the data in the receiving buffer has been processed and the buffer is again ready for action

Frame Relay

A more efficient replacement of the X.25 protocol (an unrelated packet relay technology that guarantees data delivery); an industry-standard, shared-access, best-effort, switched Data-Link layer encapsulation that services multiple virtual circuits and protocols between connected mechanisms

Type the command and then press the ? key.

A network administrator has forgotten the argument of an IOS command. How would the administrator get help from the IOS CLI to complete the command correctly?

C. What features are required for the devices? E. Do the routers and switches have enough RAM and flash memory for the proposed IOS versions?

A network administrator is planning an IOS upgrade on several of the head office routers and switches. Which three questions must be answered before continuing with the IOS selection and upgrade? (Choose three.) A. Are the devices on the same LAN? B. What models of routers and switches require upgrades? C. What features are required for the devices? D. Do the devices have enough NVRAM to store the IOS image? E. Do the routers and switches have enough RAM and flash memory for the proposed IOS versions? F. What ports are installed on the routers and switches?B. What models of routers and switches require upgrades?

B. SSH

A network administrator needs to keep the user ID, password, and session contents private when establishing remote CLI connectivity with a switch to manage it. Which access method should be chosen? A. AUX B. SSH C. Console D. Telnet

Packet Switching

A networking technology based on the transmission of data in packets. Dividing a continuous stream of data into small units—packets—enables data from multiple devices on a network to share the same communication channel simultaneously but also requires the use of precise routing information

C. Exit privileged EXEC mode and press Enter.

A new network administrator has been asked to enter a banner message on a Cisco device. What is the fastest way a network administrator could test whether the banner is properly configured? A. Reboot the device. B. Power cycle the device. C. Exit privileged EXEC mode and press Enter. D. Enter CTRL-Z at the privileged mode prompt. E. Exit global configuration mode.

(Not all options are used.) 1 Examine Packet Header 2 Determine Destination Network 3 Examine Routing Table 4 Identify Exit Interface to Destination from route entry 5 Move packet to forwarding interface

A packet arrives at a router interface. The router goes through a series of steps to determine where the packet should be forwarded. Place the steps of the router forwarding process in the correct order.

C. user EXEC mode

A router has a valid operating system and a configuration stored in NVRAM. When the router boots up, which mode will display? A. global configuration mode B. ROM monitor mode C. user EXEC mode D. setup mode

A • the size of the building B • the number of solid interior walls in the building C • the presence of microwave ovens in several offices

A technician has been asked to provide wireless connectivity to the wired Ethernet network of a building. Which three factors affect the number of access points needed? (Choose three.) A • the size of the building B • the number of solid interior walls in the building C • the presence of microwave ovens in several offices D • the encryption method used on the wireless network E • the use of both Windows and Appletalk operating systems F • the use of shortwave or infrared on the AP

the default gateway address

A technician is manually configuring a computer with the necessary IP parameters to communicate over the corporate network. The computer already has an IP address, a subnet mask, and a DNS server. What else has to be configured for Internet access?

The ports are operational and are receiving traffic.

A technician suspects that a Linksys integrated router is the source of a network problem. While troubleshooting, the technician notices a blinking green activity LED on some of the ports. What does this indicate?

Inverse ARP

A technique by which dynamic mappings are constructed in a network, allowing a device such as a router to locate the logical network address and associate it with a permanent virtual circuit (PVC). Commonly used in Frame Relay to determine the far-end node's TCP/IP address by sending the Inverse ARP request to the local DLCI; dynamically maps the destination IP with corresponding local DLCI; only one DLCI can be mapped with a layer 3 address (each DLCI is a P2P connection to a remote router); does not fn on sub-interfaces

HTTP, TCP, IP, Ethernet

A web client is sending a request for a webpage to a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to prepare the request for transmission?

EtherChannel

Aggregates redundant links into a bundle; Can provide aggregated bandwidth, avoiding congestion; Can load balance using different algorithms; Can bundle up to eight ports; All the ports should have the same speed and duplex; Provides loop-free Layer 2 network Verification - Switch# show etherchannel summary Configuring - Switch(config-if)# channel-group <group number> mode <mode>

IPv4 Supernetting

Aggregating multiple networks (could be subnets or classfull networks) into a single network advertisement; That advertisement breaks classfull boundaries; ex: 10.0.0.0 /7 is a Supernet

Command Line Interface (CLI)

Allows you to configure Cisco routers and switches with maximum flexibility

Thinnet

Also called 10Base2. Bus network that uses a thin coax cable and runs Ethernet media access up to 185 meters

Thicknet

Also called 10Base5. Bus network that uses a thick cable and runs Ethernet up to 500 meters

The segment destination port number identifies the application that should handle it.

An Internet server is running both FTP and HTTP services. How does the server know which of these applications should handle an incoming segment?

Nothing must be done. Changes to the configuration on an IOS device take effect as soon as the command is typed correctly and the Enter key has been pressed.

An administrator has just changed the IP address of an interface on an IOS device. What else must be done in order to apply those changes to the device?

Dynamic VLAN

An administrator will create an entry in a special server with the hardware addresses of all devices on the internetwork. The server will then assign dynamically used VLANs

Hierarchical Addressing

Any addressing plan employing a logical chain of commands to determine location. IP addresses are made up of a hierarchy of network numbers, subnet numbers, and host numbers to direct packets to the appropriate destination

Data Terminal Equipment

Any device located at the user end of a user-network interface serving as a destination, a source, or both; includes devices such as multiplexers, protocol translators, and computers. The connection to a data network is made through data channel equipment (DCE)

Bridges and Switches

Break up collision domains on a LAN.

Network Segmentation

Breaking up massive networks into smaller ones.

Internetworking

Broadly, anything associated with the general task of linking networks to each other. The term encompasses technologies, procedures, and products. When you connect networks to a router, you are creating one

1 Physical Layer

Cabling issues are associated with which OSI layer?

Floating Static Route

Can be configured as a backup route; Administrative distance can be increased to make a route backup; Provide redundancy between two statically defined routes; Configuration: Router(config)#iproute <destination-network> <destination subnet mask> <next-hop> <AD value>; Verification: Router# show ip route; Router# show running-config| include iproute; Router# show iproute <prefix> <mask>; Troubleshooting cmds- Router# debug ip packet; Router# default ip routing

Trunk Port

Can have two or more VLANs configured; Can carry multiple VLAN information; By default, all the VLAN traffic is allowed from this port

cdp holdtime

Changes the holdtime of CDP packets

Read Only Memory (ROM)

Chip used in computers to help boot the device. Cisco routers use a ROM chip to load the bootstrap, which runs a power-on self test, and then find and load the IOS in flash memory by default

Dynamic Trunking Protocol (DTP)

Cisco proprietary feature that allows Cisco switches to negotiate trunk dynamically; Three modes: Auto, On, Desirable; Desirable initiates the trunk, whereas Auto responds only Verification - Switch# show interface trunk; Switch# show interface <interface> switchport Configuration - Switch(config-if)# switchportmode dynamic [desirable|auto] Disabling - Switch(config-if)# switchportnonegotiate

C. Issue the reload command without saving the running configuration.

While trying to solve a network issue, a technician made multiple changes to the current router configuration file. The changes did not solve the problem and were not saved. What action can the technician take to discard the changes and work with the file in NVRAM? A. Close and reopen the terminal emulation software. B. Delete the vlan.dat file and reboot the device. C. Issue the reload command without saving the running configuration. D. Issue the copy startup-config running-config command.

B • has higher power output

Why is IEEE 802.11 wireless technology able to transmit further distances than Bluetooth technology? A • transmits at much lower frequencies B • has higher power output C • transmits at much higher frequencies D • uses better encryption methods

Hot Standby Router Protocol (HSRP)

Cisco proprietary; uses UDP port 1985 and multicast address 224.0.0.2; active and standby roles; HSRP router with highest priority is considered "active" w/ default priority = 100; MAC address: 0000.0c07.acxx (xx refers to the group number in hexadecimal); preemption disabled by default; HSRP/VRRP = No load-sharing feature; MHSRP can be used for load sharing; Requires multiple VLANs; provides high network availability and provides nearly instantaneous hardware fail-over without administrator intervention; generates a Hot Standby router group, including a lead router that lends its services to any packet being transferred to the Hot Standby address. If the lead router fails, it will be replaced by any of the other routers—the standby routers—that monitor it authentication - supported as plain text or MD5; plain-text configuration: sw1(config-if)# standby <group-id> authentication <password> Implementation: Enabling HSRP in the interface - switch(config-if)# standby <group-id> <virtual-ip>; configure priority with switch(config-if)# standby <group-id> priority <priority>; enabling preemption is switch(config-if)# standby <group-id> preempt Verification: Switch# show standby, Switch# show standby brief

OSI Model

Comprised of seven layers; hierarchy with the applications at the top and the physical medium at the bottom; the benefits of using a layered approach include: Provides easier troubleshooting, Standardizes the networking architecture, Allows vendor interoperability

TFTP

Conceptually, a stripped-down version of FTP, it's the protocol of choice if you know exactly what you want and where it's to be found. [TERM] doesn't provide the abundance of functions that FTP does. In particular, it has no directory browsing abilities; it can do nothing but send and receive files

Copies the startup-config to running-config

Config memory

BPDU Filter

Configured in access ports; Does not send or receive BPDU; Does not go into err-disabled when it receives unauthorized BPDU; Configured with the spanning-tree bpdufilter enable interface-specific command; Verified with: Switch# show spanning-tree interface <interface> detail

IOS Securing Device Access

Configuring enable password: Switch(config)# enable password <password> OR Switch(config)# enable secret <password> Configuring console password: Switch(config)# line console 0; Switch(config-line)# password <password> Configuring Telnet password: Switch(config)# line vty0 4; Switch(config-line)# password <password>; Switch(config-line)# login OR Switch(config)# username <username> privilege 15 password <password>; Switch(config-line)# login local

Local Loop

Connection from a demarcation point to the closest switching office

A. to identify the device during remote access (SSH or telnet)

Why is it important to configure a hostname on a device? A. to identify the device during remote access (SSH or telnet) B. a hostname must be configured before any other parameters C. a Cisco router or switch only begins to operate when its hostname is set D. to allow local access to the device through the console port

Link State Advertisements (LSA)

Contained inside of link-state packets (LSPs), these advertisements are usually multicast packets, containing info about neighbors and path costs, that are employed by link-state protocols. Receiving routers use LSAs to maintain their link-state databases and, ultimately, routing tables; carried within an OSPF link state update packet; different types carry different data; age out after 1 hour, refreshed every 30 mins

Unshielded Twisted Pair (UTP)

Copper wiring used in small-to-large networks to connect host devices to hubs and switches. Also used to connect switch to switch or hub to hub

Banner

Creates a banner for users who log in to the router

Access-list

Creates a list of tests to filter the networks

Moves your cursor to the beginning of the line

Ctrl+A

Deletes a single character

Ctrl+D

Moves your cursor to the end of the line

Ctrl+E

Private IPv4 address

Defined in RFC 1918; For internal use only; Range of private address: Class A: 10.0.0.0 through 10.255.255.255, Class B: 172.16.0.0 through 172.31.255.255, Class C: 192.168.0.0 through 192.168.255.255

Backspace

Deletes a single character

All components are connected to and share a single wire using special types of connectors or transceivers.

Describe a bus topology.

It provides a temporary connection across a phone circuit and are typically used for backup of primary circuits and for temporary boosts of bandwidth.

Describe a circuit-switched service.

A permanent connection between two sites in which the bandwidth is dedicated to that company's use. Common when services such as voice, video, and data, must traverse the connection.

Describe a dedicated circuit.

It has a single connection between two components, and two components can directly communicate without interference from other components.

Describe a point-to-point topology.

A central device has many point-to-point connections to other components. Star topologies are used in environments where many different devices need to be connected, with a hub or switch at the center of the star.

Describe a star topology.

Cell-switched services provide the same features that dedicated circuits offer, but their advantage is that a single device can connect to multiple devices on the same interface.

Describe cell-switched services.

Every network component is connected to every other network component.

Describe full meshing.

Packet-switched services are similar to cell-switched services, except where cell-switched services switch fixed-length packets called cells, packet-switched services switch variable-length packets. This feature makes them better suited for data services.

Describe packet-switched services.

Every network component is NOT connected to every other component.

Describe partial meshing.

It describes how network components are connected together, and can be either full or partial.

Describe the mesh topology in a network environment.

Physical: bus, star, or point to point Logical: bus

Describe the physical and logical topologies of Ethernet media.

Physical: ring Logical: :ring

Describe the physical and logical topologies of FDDI media.

Sets a description on an interface

Description

IOS Monitoring Memory and Images

Display current IOS version running: Router# show version Display all memory locations and file names: Router# dirall Display saved, startup configuration file: Router# show startup-config Display current running configuration: Router# show running-config

flash Refer to curriculum topic: 6.3.2 The IOS image is typically stored in flash memory. If the image is not in flash memory when the router boots, the router bootstrap program can look for it on a TFTP server.

During the boot process, in what memory location will the router bootstrap program look for the IOS image if a TFTP server is not used?

switch the packet to the directly connected interface

During the process of forwarding traffic, what will the router do immediately after matching the destination IP address to a network on a directly connected routing table entry?

ROM Refer to curriculum topic: 6.3.1 ROM is used to store bootup instructions, basic diagnostic software, and a copy of a limited IOS. NVRAM stores the startup configuration file. RAM provides temporary storage of the running configuration file. Flash is used to store the full Cisco IOS on a device.

During troubleshooting procedures, from which location will most Cisco routers load a limited IOS?


संबंधित स्टडी सेट्स

Measuring the Nation's Economic Performance

View Set

Med Surg III - Summer 2017 - Test 4

View Set

Chapter 30: Assessment and Management of Patients with Vascular Disorders

View Set

Chapter 7: Special Driving Situations

View Set

Visual Studio: Review Questions Chapter 3

View Set