1/90
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
---|
No study sessions yet.
What do networks enable on a global scale?
Communication, business, and entertainment.
What eliminates geographical boundaries in networking?
The Human Network.
Examples of end devices in a network include __________.
PCs, printers, servers.
What is the role of servers in a network?
Provides services such as web, email, and file sharing.
Clients in a network are responsible for __________.
Requesting services from servers.
What type of network allows devices to act as both clients and servers?
Peer-to-Peer.
What are intermediary devices used for in a network?
Managing data traffic.
What types of wired network media are commonly used?
Copper and fiber optic.
How is a physical topology different from a logical topology?
Physical topology shows actual device locations, while logical topology shows network communication paths.
What defines a LAN?
A Local Area Network covers a small geographical area.
What type of network connects multiple LANs over long distances?
WAN (Wide Area Network).
What is an intranet?
A private network for an organization.
What is an extranet?
A secure network that allows external users access.
What are common home and business internet connection types?
Broadband, DSL, fiber, cellular.
What do converged networks combine?
Data, voice, and video.
What does fault tolerance refer to in networking?
Redundant paths preventing failures.
How does scalability benefit a network?
It supports network expansion.
What is Quality of Service (QoS) used for?
Prioritizing critical data in a network.
What are some common network security threats?
Viruses, malware, hacking, insider threats.
How do firewalls contribute to network security?
They block unauthorized traffic.
What does antivirus software do?
Detects and removes threats.
What is the purpose of a VPN?
Provides secure remote access.
What does CCNA stand for?
Cisco Certified Network Associate.
What type of certifications can networking professionals pursue?
Cisco Certified Network Associate (CCNA), among others.
What is the console access method in Cisco IOS?
Direct device connection.
What does SSH stand for in terms of access methods?
Secure Shell.
What is the major risk associated with Telnet?
It provides insecure remote CLI access (plaintext).
Examples of terminal emulators include __________.
PuTTY, Tera Term.
What is the User EXEC mode used for in Cisco IOS?
Basic monitoring commands.
What command moves to Privileged EXEC mode in IOS?
enable.
Which command exits the current mode in Cisco IOS?
exit.
What can the '?' command provide in IOS?
Shows available commands.
What is the function of the 'Tab' key in Cisco IOS?
It auto-completes commands.
How can you cancel input in Cisco IOS?
By using Ctrl + C.
What command is used to assign a device name in Cisco IOS?
How do you set a Privileged EXEC password?
What command encrypts passwords in Cisco IOS?
service password-encryption.
What are banner messages used for in Cisco IOS?
To communicate a message to users, such as unauthorized access prohibitions.
What is the purpose of the startup-config file?
It saves settings in NVRAM.
What is the active settings file called in Cisco IOS?
Running-config.
What command saves the current configuration to startup-config?
copy running-config startup-config.
What does the reload command do?
Restores the last saved configuration.
What happens if the startup-config is erased?
You must use reload to restart with no startup settings.
What is the format of an IPv4 address?
Four decimal values, e.g., 192.168.1.1.
What defines the network and host portions of an IPv4 address?
Subnet Mask.
What is the function of a default gateway?
Provides the router's IP for external access.
What is the format of an IPv6 address?
128-bit, expressed in hexadecimal, e.g., 2001:db8::1.
Examples of network media types include __________.
Copper (Twisted-pair, Coaxial), Fiber-optic, Wireless.
How do you manually configure an IP address on a Windows PC?
Control Panel > Network Sharing Center > Adapter Settings > IPv4 Properties.
What do you select for automatic configuration of an IP address?
Enable 'Obtain IP address automatically' option.
How do you configure a Switch Virtual Interface (SVI)?
What command is used to verify connectivity in a network?
What command traces the path to a destination IP?
What kind of network device role does a switch play?
Intermediary device that manages data traffic.
What is a cloud computing trend in networking?
Remote data storage and services.
What does BYOD stand for in networking trends?
Bring Your Own Device.
What does Powerline Networking utilize for connectivity?
Electrical wiring.
What is an advantage of having reliable networks?
They ensure uninterrupted service through fault tolerance.
What can network quality impact in a corporate environment?
The performance and reliability of services.
What role does cybersecurity play in network management?
It protects networks from threats and unauthorized access.
How are network devices configured securely?
By implementing strong passwords and VLANs.
What is the main function of a router in a network?
To route traffic between different networks.
What distinguishes a WAN from a LAN?
WAN connects multiple LANs over long distances.
What network type would an organization use for shared resources among employees?
Intranet.
What is a benefit of using VLANs in a network?
Improved security and performance through segmentation.
How does DHCP simplify network management?
It automatically assigns IP addresses to devices.
What is the significance of the command 'configure terminal'?
It allows access to global configuration settings.
What category of devices are used to secure a network from outside threats?
Firewalls.
What should be done to a running config before an update?
Save it to startup-config to avoid loss.
What does 'escalation' refer to in a networking context?
Increasing network capacity or resources.
What is the main purpose of subnetting in networking?
To divide larger networks into smaller, manageable subnetworks.
How can network performance be measured?
Through throughput, latency, and packet loss statistics.
What is a firewalls primary task in network security?
To inspect and control network traffic.
In a peer-to-peer network, what is the primary relationship between devices?
Devices share services equally.
What is an IPv6 address used for?
Identifying devices on a network.
What is the first step in securing a network?
Implementing strong passwords.
How can you ensure redundancy in network design?
By creating multiple paths for data to travel.
What protocol is often implemented for secure remote access?
VPN.
How does Quality of Service (QoS) affect video conferencing?
It ensures video data is prioritized for better quality.
Define a VPN in networking terms.
A method to create a secure connection over a less secure network.
What does 'ping' determine in a network?
Whether a specific IP address is reachable.
How do modern networks typically ensure scalability?
By utilizing modular hardware and cloud resources.
What is a common disadvantage of a peer-to-peer network?
Lack of centralized management.
What protocol governs the sending of emails in networking?
SMTP (Simple Mail Transfer Protocol).
What is a fundamental concept behind network security?
Defending the network from potential threats.
Why is user training important in network security?
To reduce risks of human errors leading to security breaches.
What is the function of a switch in local area networking?
To forward packets based on MAC addresses.
What distinguishes a virtual LAN (VLAN) from a physical LAN?
VLANs are configuration-based segments, not hardware-defined.
How does NAT enhance security in a network?
It hides internal IP addresses from external view.
In what circumstances is it ideal to use a static IP address?
For devices that require constant addressability like servers.
What is the primary data structural consideration in subnetting?
The number of hosts needed within each subnet.