ITE 292 - NETWORKING CONTD

0.0(0)
studied byStudied by 0 people
0.0(0)
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/129

flashcard set

Earn XP

Description and Tags

SAS 11 - SAS 16

Last updated 2:16 PM on 8/21/25
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

130 Terms

1
New cards

This field of IPv6 is a 4 bit binary value set to 0110 which identifies the packet as an IPv6 packet

Version

2
New cards

This field of IPv6 is an 8 bit field that corresponds to the IPv4 Differentiated Services(DS)

Traffic Class

3
New cards

This field of IPv6 is a 20 bit field that indicates that all packets with the same flow label are handled the same way by routers

Flow label

4
New cards

This field of IPv6 is a 16 bit field that indicates the length of the packets data portion or payload

Payload Length

5
New cards

This field of IPv6 is an 8 bit field that corresponds to the IPv4 protocol field, it specifies the type of data payload carried by the packets

Next Header

6
New cards

This field of IPv6 is the IPv4 TTL is replaced by this 8 bit field, where as it passes through each router, the value is decrement by 1 and the packet is discarded once it reaches 0

Hop Limit

7
New cards

This is when a host can ping it self for testing purposes

Loopback

8
New cards

This is a host that is connected to the same local network as the sending network

Local Host

9
New cards

This is a host on a different network

Remote network

10
New cards

This is the network device (usually a router) that sends traffic to other networks. If the source and destination hosts are on different local networks, the router directs the data out of the local network to reach the destination.

The Default Gateway

11
New cards

On windows you can display the routing table by?

route print or netstat -r

12
New cards

List the sections that would be displayed when the routing table is displayed

Interface list - List of MACs and their interface number

IPv4 Table

IPv6 Table

13
New cards

List 3 things included in the routing table

  1. Directly connected routes

  2. remote routes

  3. Default routes

14
New cards

These routes come from active router interfaces with configured IP addresses.

Directly connected routes

15
New cards

These routes come from distant networks connected to other routers, learned manually or via dynamic routing.

Remote routes

16
New cards

These routes is used when no specific route exists in the routing database; the packet is sent here.

Default routes

17
New cards

On cisco IOS, which command is used to display the routing table of IPv4

show ip route

18
New cards

These 2 routing table entries are created once the router interface is configured and activated

C and L

19
New cards

This entry identifies that the network is directly connected and the interface is configured with an IP address and activated.

C

20
New cards

This entry identifies that it is a local interface.

L

21
New cards

This entry represents the Route Source which is how the network was learned by the router. It also identifies the route as an EIGRP route

D

22
New cards

Full meaning of EIGRP

Enhanced Interior Gateway routing protocol

23
New cards

This Identifies the destination network.

10.1.1.0/24

24
New cards

This is the administrative distance for the corresponding network

90

25
New cards

This represents the metric or value assigned to reach the remote network.

2170112

26
New cards

This represents the next-hop or IP address of the next router to forward the packet.

209.165.200.226

27
New cards

This represents the route Timestamp identifies when the router was last heard from.

00:00:05

28
New cards

This represents the outgoing Interface

Serial/0/0/0

29
New cards

A router is like a computer, it requires ______, ______ and _____

CPU

Operating System

Memory

30
New cards

This network is used by teleworkers, small businesses, and branch offices.

Branch

31
New cards

This network used by large businesses, organizations, and enterprises.

Wide Area Network (WAN)

32
New cards

This network a large company that delivers network services.

Service Provider

33
New cards

The CCNA certification focuses on the ______ family of

routers.

branch

34
New cards

A_____ is used to dissipate heat from the CPU in order to keep it cool.

heatsink

35
New cards

To provide routing and switching functions, the CPU requires an ________ .

operating system

36
New cards

Full meaning of cisco IOS

Cisco Internetwork Operating System (IOS)

37
New cards

This requires constant power to store data.

Volatile Memory

38
New cards

This does not require constant power.

Non-volatile Memory

39
New cards

This is a volatile memory used to store applications, processes, and data that the CPU needs to execute.

RAM

40
New cards

This is a non-volatile memory that stores critical operational instructions as well as a limited IOS.

ROM

41
New cards

This is a non-volatile memory used to store the startup configuration file permanently (startup-config).

NVRAM

42
New cards

This is a non-volatile memory used for long-term storage of the IOS and other operating system files like log or backup files.

Flash

43
New cards

List 5 types and models of router

Power supply

Cooling fan

SDRAM - Synchronous Dynamic RAM

Non volatile RAM (NVRAM)

Heat shields

CPU

Advanced Integration Module(AIM)

44
New cards

Cisco router connection has 2 categories

In-band router interfaces โ€“ LAN and WAN interfaces

Management ports โ€“ Console and AUX ports

45
New cards

List the 3 most common ways to access user EXEC mode in a Cisco router's CLI environment

Console

SSH

Telnet

46
New cards

This is a physical management port on the Cisco router that allows for out-of-band access.

Console

47
New cards

This refers to a dedicated connection that does not require network services to be configured on the router.

Out of Band

48
New cards

This is a safe way to establish a CLI connection over a network. SSH does necessitate the configuration of active networking services.

SSH

49
New cards

This is an insecure method of remotely establishing a CLI session via a network virtual interface. The connection is not secure.

Telnet

50
New cards

The router's bootup process has three major phases

  1. Run the POST and load the bootstrap program

  2. Locate and load the Cisco IOS software

  3. Locate and load the startup configuration file, or enter setup mode

51
New cards

This command displays a summary of all interfaces to ensure they are activated and operational. Look for "up" Status and "up" Protocol.

show ip interface brief

52
New cards

This command displays the contents of the RAM-stored IPv4 routing table.

show ip route

53
New cards

This command displays IPv4 statistics for all router interfaces.

show interfaces

54
New cards

This command is used to save your configuration changes.

copy running-config startup-config

55
New cards

To connect to a Layer 2 device remotely, what are the requirements

IP address

subnet mask

default gateway

56
New cards

This command is used to configure the default gateway

ip default-gateway

57
New cards

It is important to note that a switch does not

forward packets from hosts on its local network to

remote networks using the default gateway

address.

Notes

58
New cards

In an Ethernet LAN devices use broadcast to locate

  1. Other devices

  2. Services

59
New cards

_______ send out broadcast to all interfaces except the one where they are received

switches

60
New cards

2 negative impact of excessive broadcast

1, It slows down network operations

  1. It slows down devices operations

61
New cards

_____ are the smaller network spaces

Subnets

62
New cards

This reduces network traffic while improving network performance

Subnetting

63
New cards

Networks are mostly sub netted at the ____ boundary of ___/___/__-

  1. octet

  2. 8

  3. 16

  4. 24

64
New cards

_____ and ____ are the two methods for identifying the network portion

  1. Prefix Length

  2. Subnet mask

65
New cards

______ are formed from borrowing host bits for network bits

Subnets

66
New cards

The first 2 octets identify the _____

network portion

67
New cards

The last 2 octets identify the ____

host IP address

68
New cards

This technique is used to calculate subnets

Magic Number technique

69
New cards

What is the subnet value of this, 11111111.11111111.11111111.11111000

8

70
New cards

IPv4 is hierarchical and is composed of _____ and ______

Network portion

Host portion

71
New cards

The _____ is used to identify the network portion and host portion

Subnet Mask

72
New cards

The logical AND is used to determine _____

Network address

73
New cards

This is a shorthand method of expressing the subnet mask

Prefix length

74
New cards

This is the host portion with all 00000000

Network address

75
New cards

This is the host portion with all 0s and ends with a 1

First Host address

76
New cards

This is the host portion with all 1s and ends with a 0

Last host address

77
New cards

This is the host portion with all 1s

Broadcast address

78
New cards

IPv4 has 3 communication means

Unicast

Multicast

Broadcast

79
New cards

This is the one - to - one communication in IPv4

Unicast

80
New cards

This is the one to a select group communication in IPv4

Multicast

81
New cards

This is the one to all communication in IPv4

Broadcast

82
New cards

List the types of IPv4

  1. Private address

  2. Special User IPv4 address

  3. Legacy Classful Addressing

  4. Classless addressing

83
New cards

This type of IPv4 is non-routable and was defined by RFC in 1918 and is only used for internal networks

Private address

84
New cards

This is a special user address that is used on a host to test for TCP/IP connection

Loopback addressing

85
New cards

This is a special user addressing that windows clients can use if thereโ€™s no DHCP for self configuration

Link-Local addressing

86
New cards

This is a special user addressing that is used for teaching and learning purposes

TEST -NET address

87
New cards

This type of IPv4 addressing that assigns IPv4 into classes

Legacy classful addressing

88
New cards

This class ranges form (0.0.0.0/8 - 127.0.0.0/8) and is used for large networks

Class A

89
New cards

This class ranges from (128.0.0.0 /16- 191.255.0.0/16) and is used for medium networks

Class B

90
New cards

This class ranges from(192.0.0.0/24 - 223.255.255.0/24) and is used for smaller networks

Class C

91
New cards

This type of IPv4 enables service providers to assign IPv4 addresses based on their prefix length rather than classes. The employ the use of CIDR

Classless addressing

92
New cards

Full meaning of CIDR

Classless Inter Domain Addressing

93
New cards

This rule of IPv6 omits leading zeros in any hextet

Omit Leading to 0

94
New cards

This rule of IPv6 says that a double colon can replace any single contiguous string of one or more 16 bit segments consisting of all 0s

Omit all 0 segments

95
New cards

The 3 types of IPv6

Unicast

Multicast

Anycast

96
New cards

This type of IPv6 has a single IPv6 source address

Unicast

97
New cards

This type of Ipv6 address are sued to send a single IPv6 packet to a multiple destination

Multicast

98
New cards

This is a unique address that assigned to multiple devices

Anycast

99
New cards

The length of an IPv6 prefix indicates the ______ of the IPv6 packet

Network portion

100
New cards

This IPv6 Unicast addressing is used to communicate with other devices on the same local link

Link Local