Cisco Mod 1-3
Switch Virtual Interface Configuration
# interface vlan 1 # ip address ______________ # no shutdown
Privileged EXEC mode (#)
-Accessed by entering the enable command -Identified by a prompt ending with the # character
Global configuration mode (config)#
-Changes made affect the operation of the device as a whole -Accessed by entering the configure terminal command
Name three modes or interfaces that can be protected with passwords:
-Privileged EXEC mode (#) -Console interface -VTY Interface
ServerB is attempting to contact HostA. Which two statements correctly identify the addressing that ServerB will generate in the process?
-ServerB will generate a frame with the destination MAC address of RouterB -ServerB will generate a packet with the destination IP address of HostA
User EXEC mode (>)
-The first entrance into the CLI of an IOS device -Limited number of basic monitoring commands
Communications Protocols
-all communications are governed by protocols -rules that communications will follow -rules vary depending on protocol
Scalability
-expand the network without degrading the service for existing users
The two characteristics of RAM:
-it is volatile memory. it loses all of its content when the device is powered off or restarted -it stores the configuration that is actively running on the device
Security
-protect the network from unauthorized access
Fault tolerance
-provide redundant links and devices
Device Names Rules
-start with a letter -no spaces -end with a letter or digit -letters, digits, dashes only -less than 64 characters
A user is implementing security on a small office network. Which 2 actions would provide the minimum security requirements for this network?
1. Implement a firewall 2. Install antivirus software
What is an advantage of network devices using open standard protocols?
A client host and a server running different operating systems can successfully exchange data
What is an advantage of network devices using open standard protocols?
A client host and server running different operating systems can successfully exchange data
The intranet
A private collection of LANs and WANs internal to an organization that is meant to be accessible only to organization members or others with authorization.
Which device performs the function of determining the path that messages should take through internetworks?
A router
Ctrl+Shift+6
All-purpose break sequence used to abort DNS lookups, traceroutes, pings, etc.
SVI (Switch Virtual Interface)
Allows remote management of a Layer 2 switch
Exit
Allows the user to return to the previous hiearchy level
BOYD (Bring Your Own Device)
Allows users to use their own devices giving them more opportunities and greater flexibility.
The extranet
An organization that provides secure access to their network for individuals who work for a different organization that need access to their data on their network.
At which OSI layer is data added to a PDU during the encapsulation process?
Application
Peer-to-peer networks
Both clients and servers.
What term describes a computing model where server software runs on dedicated computers?
Client server
What term describes storing personal files on servers over the internet to provide access anywhere, anytime, and on any device?
Cloud
Tab
Completes a partial command name entry
PDU (Protocol Data Unit)
Data Segment (Ports) Packet (IP Address) Frame (Mac address) Bits
At which OSI layer is a destination MAC address added to a PDU during the encapsulation process?
Data link
At which OSI layer is a source MAC added to a PDU during the encapsulation process?
Data link
Encapsulation (SENT)
Data, TCP, IP, Ethernet
Internet
Determines the best path through the network
Access method
Determines when someone can send a message
SOHO
Enables computer within a home or remote office to connect to a corporate network. (Small Office/Home Office)
Any other key
Ends the display string, returning to privileged EXEC mode
Backspace
Erases the character to the left of the cursor
Secure shell
Establishes a secure remote CLI connection to a device, through a virtual interface, over a network (Recommended method for remote connection)
Telnet
Establishes an insecure CLI connection to a device over the network (Insecure bc passwords are in plaintext)
Encapsulation (RECEIVED)
Ethernet, IP, TCP, Data
A web client is receiving a response for a web page from a web server. From the perspective of the client, what is the correct order of the protocol stack that is used to decode the received transmission?
Ethernet, IP, TCP, HTTP
Network Architecture
Fault Tolerance Quality of Service Scalability Security
What three applications layer protocols are part of the TCP/IP protocol suite?
HTTP DNS DHCP FTP
IP address
Internet protocol address
In the show running-config command, which part of the syntax is represented by running-config?
Key word
LAN
Local Area Network
Response timeout
Manages how long a device waits when it does not hear a reply from the destination
Flow control
Manages the rate of data transmission and defines how much information can be sent and the speed at which it can be delivered
Left Arrow (Ctrl+B)
Moves the cursor one character to the left
Right Arrow (Ctrl+F)
Moves the cursor one character to the right
At which OSI layer is a destination IP address added to a PDU during the encapsulation process?
Network
At which OSI layer is a source IP address added to a PDU during the encapsulation process?
Network
TCP/IP Model
Network access Internet Transport Application
Broadcast (IPv4)
One to all
Multicast
One to many, typically not all
Unicast
One to one communication
OSI Model
Physical Data link Network Transport Session Presentation Application - Please Do Not Throw Sausage Pizza Away
What term describes a policy that allows network devices to manage the flow of data to give priority to voice and video?
QOS (Quality of Service)
Up Arrow (Ctrl+P)
Recalls the commands in the history buffer, beginning with the most recent commands
Application
Represents data to the user, plus encoding and dialog control
Network access
Represents data to the user, plus encoding and dialog control
A networking technician is working on the wireless network at a medical clinic. The technician accidentally sets up the wireless network so patients can see medical records data of other patients. Which of the four network characteristics is violated?
Security
Transport
Supports communication between various devices across diverse networks
What two criteria are used to help select a network medium from various network media?
The distance the selected medium can successfully carry a signal. The environment where the selected medium is to be installed.
After making configuration changes on a cisco switch, a network administrator issues a copy running-config startup-config command. What is the result of issuing this command?
The new configuration (RAM -> NVRAM)
Encapsulation
The process where protocols add their information to the data
startup-config & running-config
The two system files that store the device configuration
(config)# service password-encryption
To encrypt plaintext passwords (then, show running-config to check)
copy running-config startup-config
To save changes made to the running configuration to the startup configuration file
At which ODI layer is a source port number added to a PDU during the encapsulation process?
Transport
At which OSI layer is a destination port number added to a PDU during the encapsulation process?
Transport
At which OSI layer is a source port number added to a PDU during the encapsulation process?
Transport
Powerline networking
Using a standard powerline adapter, devices can connect to the LAN wherever there is an electrical outlet by sending data on certain frequencies.
Quality of service
Voice and live video (high priority) transmissions require higher expectations for those services being delivered.
Ctrl+C or Ctrl+Z
When in any configuration mode, ends the configuration mode and returns to privileged EXEC mode
WAN
Wide Area Network
VTY Password Configuration
line vty 0 15 password cisco login end