Networking 1

0.0(0)
studied byStudied by 0 people
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/90

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

91 Terms

1
New cards

What do networks enable on a global scale?

Communication, business, and entertainment.

2
New cards

What eliminates geographical boundaries in networking?

The Human Network.

3
New cards

Examples of end devices in a network include __________.

PCs, printers, servers.

4
New cards

What is the role of servers in a network?

Provides services such as web, email, and file sharing.

5
New cards

Clients in a network are responsible for __________.

Requesting services from servers.

6
New cards

What type of network allows devices to act as both clients and servers?

Peer-to-Peer.

7
New cards

What are intermediary devices used for in a network?

Managing data traffic.

8
New cards

What types of wired network media are commonly used?

Copper and fiber optic.

9
New cards

How is a physical topology different from a logical topology?

Physical topology shows actual device locations, while logical topology shows network communication paths.

10
New cards

What defines a LAN?

A Local Area Network covers a small geographical area.

11
New cards

What type of network connects multiple LANs over long distances?

WAN (Wide Area Network).

12
New cards

What is an intranet?

A private network for an organization.

13
New cards

What is an extranet?

A secure network that allows external users access.

14
New cards

What are common home and business internet connection types?

Broadband, DSL, fiber, cellular.

15
New cards

What do converged networks combine?

Data, voice, and video.

16
New cards

What does fault tolerance refer to in networking?

Redundant paths preventing failures.

17
New cards

How does scalability benefit a network?

It supports network expansion.

18
New cards

What is Quality of Service (QoS) used for?

Prioritizing critical data in a network.

19
New cards

What are some common network security threats?

Viruses, malware, hacking, insider threats.

20
New cards

How do firewalls contribute to network security?

They block unauthorized traffic.

21
New cards

What does antivirus software do?

Detects and removes threats.

22
New cards

What is the purpose of a VPN?

Provides secure remote access.

23
New cards

What does CCNA stand for?

Cisco Certified Network Associate.

24
New cards

What type of certifications can networking professionals pursue?

Cisco Certified Network Associate (CCNA), among others.

25
New cards

What is the console access method in Cisco IOS?

Direct device connection.

26
New cards

What does SSH stand for in terms of access methods?

Secure Shell.

27
New cards

What is the major risk associated with Telnet?

It provides insecure remote CLI access (plaintext).

28
New cards

Examples of terminal emulators include __________.

PuTTY, Tera Term.

29
New cards

What is the User EXEC mode used for in Cisco IOS?

Basic monitoring commands.

30
New cards

What command moves to Privileged EXEC mode in IOS?

enable.

31
New cards

Which command exits the current mode in Cisco IOS?

exit.

32
New cards

What can the '?' command provide in IOS?

Shows available commands.

33
New cards

What is the function of the 'Tab' key in Cisco IOS?

It auto-completes commands.

34
New cards

How can you cancel input in Cisco IOS?

By using Ctrl + C.

35
New cards

What command is used to assign a device name in Cisco IOS?

hostname .
36
New cards

How do you set a Privileged EXEC password?

enable secret .
37
New cards

What command encrypts passwords in Cisco IOS?

service password-encryption.

38
New cards

What are banner messages used for in Cisco IOS?

To communicate a message to users, such as unauthorized access prohibitions.

39
New cards

What is the purpose of the startup-config file?

It saves settings in NVRAM.

40
New cards

What is the active settings file called in Cisco IOS?

Running-config.

41
New cards

What command saves the current configuration to startup-config?

copy running-config startup-config.

42
New cards

What does the reload command do?

Restores the last saved configuration.

43
New cards

What happens if the startup-config is erased?

You must use reload to restart with no startup settings.

44
New cards

What is the format of an IPv4 address?

Four decimal values, e.g., 192.168.1.1.

45
New cards

What defines the network and host portions of an IPv4 address?

Subnet Mask.

46
New cards

What is the function of a default gateway?

Provides the router's IP for external access.

47
New cards

What is the format of an IPv6 address?

128-bit, expressed in hexadecimal, e.g., 2001:db8::1.

48
New cards

Examples of network media types include __________.

Copper (Twisted-pair, Coaxial), Fiber-optic, Wireless.

49
New cards

How do you manually configure an IP address on a Windows PC?

Control Panel > Network Sharing Center > Adapter Settings > IPv4 Properties.

50
New cards

What do you select for automatic configuration of an IP address?

Enable 'Obtain IP address automatically' option.

51
New cards

How do you configure a Switch Virtual Interface (SVI)?

interface vlan 1, ip address , no shutdown.
52
New cards

What command is used to verify connectivity in a network?

ping .
53
New cards

What command traces the path to a destination IP?

traceroute .
54
New cards

What kind of network device role does a switch play?

Intermediary device that manages data traffic.

55
New cards

What is a cloud computing trend in networking?

Remote data storage and services.

56
New cards

What does BYOD stand for in networking trends?

Bring Your Own Device.

57
New cards

What does Powerline Networking utilize for connectivity?

Electrical wiring.

58
New cards

What is an advantage of having reliable networks?

They ensure uninterrupted service through fault tolerance.

59
New cards

What can network quality impact in a corporate environment?

The performance and reliability of services.

60
New cards

What role does cybersecurity play in network management?

It protects networks from threats and unauthorized access.

61
New cards

How are network devices configured securely?

By implementing strong passwords and VLANs.

62
New cards

What is the main function of a router in a network?

To route traffic between different networks.

63
New cards

What distinguishes a WAN from a LAN?

WAN connects multiple LANs over long distances.

64
New cards

What network type would an organization use for shared resources among employees?

Intranet.

65
New cards

What is a benefit of using VLANs in a network?

Improved security and performance through segmentation.

66
New cards

How does DHCP simplify network management?

It automatically assigns IP addresses to devices.

67
New cards

What is the significance of the command 'configure terminal'?

It allows access to global configuration settings.

68
New cards

What category of devices are used to secure a network from outside threats?

Firewalls.

69
New cards

What should be done to a running config before an update?

Save it to startup-config to avoid loss.

70
New cards

What does 'escalation' refer to in a networking context?

Increasing network capacity or resources.

71
New cards

What is the main purpose of subnetting in networking?

To divide larger networks into smaller, manageable subnetworks.

72
New cards

How can network performance be measured?

Through throughput, latency, and packet loss statistics.

73
New cards

What is a firewalls primary task in network security?

To inspect and control network traffic.

74
New cards

In a peer-to-peer network, what is the primary relationship between devices?

Devices share services equally.

75
New cards

What is an IPv6 address used for?

Identifying devices on a network.

76
New cards

What is the first step in securing a network?

Implementing strong passwords.

77
New cards

How can you ensure redundancy in network design?

By creating multiple paths for data to travel.

78
New cards

What protocol is often implemented for secure remote access?

VPN.

79
New cards

How does Quality of Service (QoS) affect video conferencing?

It ensures video data is prioritized for better quality.

80
New cards

Define a VPN in networking terms.

A method to create a secure connection over a less secure network.

81
New cards

What does 'ping' determine in a network?

Whether a specific IP address is reachable.

82
New cards

How do modern networks typically ensure scalability?

By utilizing modular hardware and cloud resources.

83
New cards

What is a common disadvantage of a peer-to-peer network?

Lack of centralized management.

84
New cards

What protocol governs the sending of emails in networking?

SMTP (Simple Mail Transfer Protocol).

85
New cards

What is a fundamental concept behind network security?

Defending the network from potential threats.

86
New cards

Why is user training important in network security?

To reduce risks of human errors leading to security breaches.

87
New cards

What is the function of a switch in local area networking?

To forward packets based on MAC addresses.

88
New cards

What distinguishes a virtual LAN (VLAN) from a physical LAN?

VLANs are configuration-based segments, not hardware-defined.

89
New cards

How does NAT enhance security in a network?

It hides internal IP addresses from external view.

90
New cards

In what circumstances is it ideal to use a static IP address?

For devices that require constant addressability like servers.

91
New cards

What is the primary data structural consideration in subnetting?

The number of hosts needed within each subnet.